GHSA-Q579-9WP9-GFP2

Vulnerability from github – Published: 2022-06-17 00:14 – Updated: 2023-06-13 20:10
VLAI?
Summary
Window can read out of bounds if Read instance returns more bytes than buffer size
Details

rdiff performs a diff of two provided strings or files. As part of its reading code it uses the return value of a Read instance to set the length of its internal character vector.

If the Read implementation claims that it has read more bytes than the length of the provided buffer, the length of the vector will be set to longer than its capacity. This causes rdiff APIs to return uninitialized memory in its API methods.

Show details on source website

{
  "affected": [
    {
      "package": {
        "ecosystem": "crates.io",
        "name": "rdiff"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "last_affected": "0.1.2"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    }
  ],
  "aliases": [],
  "database_specific": {
    "cwe_ids": [],
    "github_reviewed": true,
    "github_reviewed_at": "2022-06-17T00:14:18Z",
    "nvd_published_at": null,
    "severity": "HIGH"
  },
  "details": "`rdiff` performs a diff of two provided strings or files. As part of its reading code it uses the return value of a `Read` instance to set the length of its internal character vector.\n\nIf the `Read` implementation claims that it has read more bytes than the length of the provided buffer, the length of the vector will be set to longer than its capacity. This causes `rdiff` APIs to return uninitialized memory in its API\nmethods.\n",
  "id": "GHSA-q579-9wp9-gfp2",
  "modified": "2023-06-13T20:10:22Z",
  "published": "2022-06-17T00:14:18Z",
  "references": [
    {
      "type": "WEB",
      "url": "https://github.com/dyule/rdiff/issues/3"
    },
    {
      "type": "PACKAGE",
      "url": "https://github.com/dyule/rdiff"
    },
    {
      "type": "WEB",
      "url": "https://rustsec.org/advisories/RUSTSEC-2021-0094.html"
    }
  ],
  "schema_version": "1.4.0",
  "severity": [],
  "summary": "Window can read out of bounds if Read instance returns more bytes than buffer size"
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…