CVE-2024-32650 Affecting kdash package, versions <0.6.1-r0
Threat Intelligence
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-WOLFILATEST-KDASH-7851913
- published 29 Aug 2024
- disclosed 19 Apr 2024
Introduced: 19 Apr 2024
CVE-2024-32650 Open this link in a new tabHow to fix?
Upgrade Wolfi
kdash
to version 0.6.1-r0 or higher.
NVD Description
Note: Versions mentioned in the description apply only to the upstream kdash
package and not the kdash
package as distributed by Wolfi
.
See How to fix?
for Wolfi
relevant fixed versions and status.
Rustls is a modern TLS library written in Rust. rustls::ConnectionCommon::complete_io
could fall into an infinite loop based on network input. When using a blocking rustls server, if a client send a close_notify
message immediately after client_hello
, the server's complete_io
will get in an infinite loop. This vulnerability is fixed in 0.23.5, 0.22.4, and 0.21.11.
References
- https://github.com/rustls/rustls/commit/2123576840aa31043a31b0770e6572136fbe0c2d
- https://github.com/rustls/rustls/commit/6e938bcfe82a9da7a2e1cbf10b928c7eca26426e
- https://github.com/rustls/rustls/commit/f45664fbded03d833dffd806503d3c8becd1b71e
- https://github.com/rustls/rustls/security/advisories/GHSA-6g7w-8wpp-frhj