Skip to content
This repository has been archived by the owner on Jun 17, 2022. It is now read-only.

RUSTSEC-2020-0002: Parsing a specially crafted message can result in a stack overflow #168

Open
github-actions bot opened this issue Jan 17, 2020 · 0 comments

Comments

@github-actions
Copy link

Parsing a specially crafted message can result in a stack overflow

Details
Package prost
Version 0.5.0
URL https://github.com/danburkert/prost/issues/267
Date 2020-01-16
Patched versions >= 0.6.1

Affected versions of this crate contained a bug in which decoding untrusted
input could overflow the stack.

On architectures with stack probes (like x86), this can be used for denial of
service attacks, while on architectures without stack probes (like ARM)
overflowing the stack is unsound and can result in potential memory corruption
(or even RCE).

The flaw was quickly corrected by @danburkert and released in version 0.6.1.

See advisory page for additional details.

Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
None yet
Projects
None yet
Development

No branches or pull requests

0 participants