GHSA-rp9h-rf7g-hwgr

Suggest an improvement
Source
https://github.com/advisories/GHSA-rp9h-rf7g-hwgr
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/11/GHSA-rp9h-rf7g-hwgr/GHSA-rp9h-rf7g-hwgr.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-rp9h-rf7g-hwgr
Related
Published
2024-11-14T15:45:55Z
Modified
2024-11-14T15:45:55Z
Summary
s2n-tls has undefined behavior at process exit
Details

Impact

s2n-tls uses the Linux atexit function to register functions that clean up the global state when the process exits. In multi-threaded environments, the atexit handler may clean up state which is still in use by other threads. When this occurs, the exiting process may experience a segmentation fault or other undefined behavior.

Customers of AWS services do not need to take action. Applications using s2n-tls should upgrade to the most recent release of s2n-tls.

Impacted versions: < v1.5.9.

Patches

The patch commit 493b771 is included in s2n-tls v1.5.9 [1]

Workarounds

The atexit handler may be disabled by calling s2n_disable_atexit() prior to initializing s2n-tls. The atexit handler is off by default in the patched versions. For further details, refer to s2n-tls Usage Guide: Initialization and Teardown.

If you have any questions or comments about this advisory, we ask that you contact AWS/Amazon Security via our vulnerability reporting page [2] or directly via email to aws-security@amazon.com. Please do not create a public GitHub issue.

[1] https://github.com/aws/s2n-tls/releases/tag/v1.5.9 [2] Vulnerability reporting page: https://aws.amazon.com/security/vulnerability-reporting

Database specific
{
    "nvd_published_at": null,
    "cwe_ids": [],
    "severity": "LOW",
    "github_reviewed": true,
    "github_reviewed_at": "2024-11-14T15:45:55Z"
}
References

Affected packages

crates.io / s2n-tls

Package

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.3.7