RUSTSEC-2020-0019

tokio-rustls reads may cause excessive memory usage

Issued
Package
tokio-rustls (crates.io)
Type
Vulnerability
Categories
  • denial-of-service
Aliases
Details
https://github.com/tokio-rs/tls/pull/14
Patched
  • >=0.12.3, <0.13.0
  • >=0.13.1
Unaffected
  • <0.12
Keywords
  • tls
  • ssl
  • DoS

Description

tokio-rustls does not call process_new_packets immediately after read, so the expected termination condition wants_read always returns true. As long as new incoming data arrives faster than it is processed and the reader does not return pending, data will be buffered.

This may cause DoS.

More