mirror of
https://github.com/OMGeeky/advisory-db.git
synced 2026-01-08 20:47:14 +01:00
Merge branch 'master' into http2
This commit is contained in:
24
crates/http/RUSTSEC-2019-0033.toml
Normal file
24
crates/http/RUSTSEC-2019-0033.toml
Normal file
@@ -0,0 +1,24 @@
|
||||
[advisory]
|
||||
id = "RUSTSEC-2019-0033"
|
||||
package = "http"
|
||||
date = "2019-11-16"
|
||||
title = "Integer Overflow in HeaderMap::reserve() can cause Denial of Service"
|
||||
description = """
|
||||
`HeaderMap::reserve()` used `usize::next_power_of_two()` to calculate the increased capacity.
|
||||
However, `next_power_of_two()` silently overflows to 0 if given a sufficently large number
|
||||
in release mode.
|
||||
|
||||
If the map was not empty when the overflow happens,
|
||||
the library will invoke `self.grow(0)` and start infinite probing.
|
||||
This allows an attacker who controls the argument to `reserve()`
|
||||
to cause a potential denial of service (DoS).
|
||||
|
||||
The flaw was corrected in 0.2.0 release of `http` crate.
|
||||
"""
|
||||
patched_versions = [">= 0.2.0"]
|
||||
url = "https://github.com/hyperium/http/issues/352"
|
||||
categories = ["denial-of-service"]
|
||||
keywords = ["http", "integer-overflow", "DoS"]
|
||||
|
||||
[affected.functions]
|
||||
"http::header::HeaderMap::reserve" = ["< 0.2.0"]
|
||||
Reference in New Issue
Block a user