mirror of
https://github.com/rustsec/advisory-db.git
synced 2025-12-27 01:54:07 -05:00
729 B
729 B
[advisory]
id = "RUSTSEC-2023-0077"
package = "rosenpass"
date = "2023-11-04"
references = ["https://github.com/rosenpass/rosenpass/commit/93439858d1c44294a7b377f775c4fc897a370bb2"]
categories = ["denial-of-service"]
keywords = ["remote", "single-byte"]
license = "CC0-1.0"
aliases = ["GHSA-6ggr-cwv4-g7qg"]
[versions]
patched = [">= 0.2.1"]
Remotely exploitable DoS condition in Rosenpass <=0.2.0
Affected version do this crate did not validate the size of buffers when attempting to decode messages.
This allows an attacker to trigger a panic by sending a UDP datagram with a 1 byte payload over network.
This flaw was corrected by validating the size of the buffers before attempting to decode the message.