Skip to content

Commit 449223b

Browse files
authored
Merge pull request #54 from ruuda/claxon
Add advisory for Claxon 0.3.2 and 0.4.1
2 parents bbfce11 + a79e12f commit 449223b

File tree

1 file changed

+22
-0
lines changed

1 file changed

+22
-0
lines changed

crates/claxon/RUSTSEC-0000-0000.toml

Lines changed: 22 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,22 @@
1+
[advisory]
2+
id = "RUSTSEC-0000-0000"
3+
package = "claxon"
4+
date = "2018-08-25"
5+
title = "Malicious input could cause uninitialized memory to be exposed"
6+
description = """
7+
Affected versions of Claxon made an invalid assumption about the decode buffer
8+
size being a multiple of a value read from the bitstream. This could cause parts
9+
of the decode buffer to not be overwritten. If the decode buffer was newly
10+
allocated and uninitialized, this uninitialized memory could be exposed.
11+
12+
This allows an attacker to observe parts of the uninitialized memory in the
13+
decoded audio stream.
14+
15+
The flaw was corrected by checking that the value read from the bistream divides
16+
the decode buffer size, and returning a format error if it does not. If an error
17+
is returned, the decode buffer is not exposed. Regression tests and an
18+
additional fuzzer have been added to prevent similar flaws in the future.
19+
"""
20+
patched_versions = ["=0.3.2", ">= 0.4.1"]
21+
url = "https://github.com/ruuda/claxon/commit/8f28ec275e412dd3af4f3cda460605512faf332c"
22+
keywords = ["uninitialized-memory"]

0 commit comments

Comments
 (0)