GHSA-Q579-9WP9-GFP2
Vulnerability from github – Published: 2022-06-17 00:14 – Updated: 2023-06-13 20:10
VLAI?
Summary
Window can read out of bounds if Read instance returns more bytes than buffer size
Details
rdiff performs a diff of two provided strings or files. As part of its reading code it uses the return value of a Read instance to set the length of its internal character vector.
If the Read implementation claims that it has read more bytes than the length of the provided buffer, the length of the vector will be set to longer than its capacity. This causes rdiff APIs to return uninitialized memory in its API
methods.
{
"affected": [
{
"package": {
"ecosystem": "crates.io",
"name": "rdiff"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "0.1.2"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"aliases": [],
"database_specific": {
"cwe_ids": [],
"github_reviewed": true,
"github_reviewed_at": "2022-06-17T00:14:18Z",
"nvd_published_at": null,
"severity": "HIGH"
},
"details": "`rdiff` performs a diff of two provided strings or files. As part of its reading code it uses the return value of a `Read` instance to set the length of its internal character vector.\n\nIf the `Read` implementation claims that it has read more bytes than the length of the provided buffer, the length of the vector will be set to longer than its capacity. This causes `rdiff` APIs to return uninitialized memory in its API\nmethods.\n",
"id": "GHSA-q579-9wp9-gfp2",
"modified": "2023-06-13T20:10:22Z",
"published": "2022-06-17T00:14:18Z",
"references": [
{
"type": "WEB",
"url": "https://github.com/dyule/rdiff/issues/3"
},
{
"type": "PACKAGE",
"url": "https://github.com/dyule/rdiff"
},
{
"type": "WEB",
"url": "https://rustsec.org/advisories/RUSTSEC-2021-0094.html"
}
],
"schema_version": "1.4.0",
"severity": [],
"summary": "Window can read out of bounds if Read instance returns more bytes than buffer size"
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…