GHSA-pjrj-h4fg-6gm4

Suggest an improvement
Source
https://github.com/advisories/GHSA-pjrj-h4fg-6gm4
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/12/GHSA-pjrj-h4fg-6gm4/GHSA-pjrj-h4fg-6gm4.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-pjrj-h4fg-6gm4
Aliases
Published
2023-12-05T23:42:49Z
Modified
2023-12-05T23:58:16.114614Z
Severity
  • 5.3 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L CVSS Calculator
Summary
tokio-boring vulnerable to resource exhaustion via memory leak
Details

Impact

The tokio-boring library in version 4.0.0 is affected by a memory leak issue that can lead to excessive resource consumption and potential DoS by resource exhaustion. The set_ex_data function used by the library did not deallocate memory used by pre-existing data in memory each time after completing a TLS connection causing the program to consume more resources with each new connection.

Patches

The issue is fixed in version 4.1.0 of tokio-boring.

References

CVE-2023-6180 at cve.org

Database specific
{
    "nvd_published_at": "2023-12-05T15:15:08Z",
    "cwe_ids": [
        "CWE-400",
        "CWE-401",
        "CWE-404"
    ],
    "severity": "MODERATE",
    "github_reviewed": true,
    "github_reviewed_at": "2023-12-05T23:42:49Z"
}
References

Affected packages

crates.io / tokio-boring

Package

Affected ranges

Type
SEMVER
Events
Introduced
4.0.0
Fixed
4.1.0

Affected versions

4.*

4.0.0