mirror of
https://github.com/OMGeeky/advisory-db.git
synced 2025-12-26 16:07:48 +01:00
Fix typos (#1729)
This commit is contained in:
@@ -12,7 +12,7 @@ aliases = ["GHSA-ppjr-267j-5p9x"]
|
||||
patched = [">= 0.2.5"]
|
||||
```
|
||||
|
||||
# NULL pointer derefernce in `stb_image`
|
||||
# NULL pointer dereference in `stb_image`
|
||||
|
||||
A bug in error handling in the `stb_image` C library could cause a NULL pointer dereference when attempting to load an invalid or unsupported image file. This is fixed in version 0.2.5 and later of the `stb_image` Rust crate, by patching the C code to correctly handle NULL pointers.
|
||||
|
||||
|
||||
@@ -11,6 +11,6 @@ patched = [">= 1.51.0"]
|
||||
unaffected = ["< 1.11.0"]
|
||||
```
|
||||
|
||||
# TrustedRandomAaccess specialization composes incorrectly for nested iter::Zips
|
||||
# TrustedRandomAccess specialization composes incorrectly for nested iter::Zips
|
||||
|
||||
In the standard library in Rust before 1.51.0, the Zip implementation calls __iterator_get_unchecked() for the same index more than once when nested. This bug can lead to a memory safety violation due to an unmet safety requirement for the TrustedRandomAccess trait.
|
||||
In the standard library in Rust before 1.51.0, the Zip implementation calls `__iterator_get_unchecked()` for the same index more than once when nested. This bug can lead to a memory safety violation due to an unmet safety requirement for the `TrustedRandomAccess` trait.
|
||||
|
||||
@@ -20,7 +20,7 @@ patched = [">= 1.53.0"]
|
||||
|
||||
Improper input validation of octal strings in rust-lang standard library `net` allows unauthenticated remote attackers to perform
|
||||
indeterminate SSRF, RFI, and LFI attacks on many programs that rely on rust-lang std::net.
|
||||
IP address octects are left stripped instead of evaluated as valid IP addresses.
|
||||
IP address octets are left stripped instead of evaluated as valid IP addresses.
|
||||
For example, an attacker submitting an IP address to a web application that relies on `std::net::IpAddr`,
|
||||
could cause SSRF via inputting octal input data;
|
||||
An attacker can submit exploitable IP addresses if the octet is 3 digits,
|
||||
|
||||
Reference in New Issue
Block a user