mirror of
https://github.com/rustsec/advisory-db.git
synced 2025-12-27 01:54:07 -05:00
Add conduit-hyper CVE-2022-39294 (#1456)
This commit is contained in:
24
crates/conduit-hyper/RUSTSEC-0000-0000.md
Normal file
24
crates/conduit-hyper/RUSTSEC-0000-0000.md
Normal file
@@ -0,0 +1,24 @@
|
||||
```toml
|
||||
[advisory]
|
||||
id = "RUSTSEC-0000-0000"
|
||||
package = "conduit-hyper"
|
||||
date = "2022-10-30"
|
||||
url = "https://github.com/conduit-rust/conduit-hyper/security/advisories/GHSA-9398-5ghf-7pr6"
|
||||
categories = ["denial-of-service"]
|
||||
aliases = ["GHSA-9398-5ghf-7pr6", "CVE-2022-39294"]
|
||||
cvss = "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
|
||||
|
||||
[versions]
|
||||
patched = [">= 0.4.2"]
|
||||
unaffected = ["< 0.2.0-alpha.3"]
|
||||
```
|
||||
|
||||
# Denial of Service from unchecked request length
|
||||
|
||||
Prior to version 0.4.2, `conduit-hyper` did not check any limit on a request's
|
||||
length before calling `hyper::body::to_bytes`. An attacker could send a
|
||||
malicious request with an abnormally large `Content-Length`, which could lead
|
||||
to a panic if memory allocation failed for that request.
|
||||
|
||||
In version 0.4.2, `conduit-hyper` sets an internal limit of 128 MiB per
|
||||
request, otherwise returning status 400 ("Bad Request").
|
||||
Reference in New Issue
Block a user