mirror of
https://github.com/OMGeeky/advisory-db.git
synced 2026-02-15 22:04:38 +01:00
23 lines
1.0 KiB
TOML
23 lines
1.0 KiB
TOML
[advisory]
|
|
id = "RUSTSEC-2018-0004"
|
|
package = "claxon"
|
|
date = "2018-08-25"
|
|
title = "Malicious input could cause uninitialized memory to be exposed"
|
|
description = """
|
|
Affected versions of Claxon made an invalid assumption about the decode buffer
|
|
size being a multiple of a value read from the bitstream. This could cause parts
|
|
of the decode buffer to not be overwritten. If the decode buffer was newly
|
|
allocated and uninitialized, this uninitialized memory could be exposed.
|
|
|
|
This allows an attacker to observe parts of the uninitialized memory in the
|
|
decoded audio stream.
|
|
|
|
The flaw was corrected by checking that the value read from the bistream divides
|
|
the decode buffer size, and returning a format error if it does not. If an error
|
|
is returned, the decode buffer is not exposed. Regression tests and an
|
|
additional fuzzer have been added to prevent similar flaws in the future.
|
|
"""
|
|
patched_versions = ["=0.3.2", ">= 0.4.1"]
|
|
url = "https://github.com/ruuda/claxon/commit/8f28ec275e412dd3af4f3cda460605512faf332c"
|
|
keywords = ["uninitialized-memory"]
|