File tree Expand file tree Collapse file tree 1 file changed +22
-0
lines changed Expand file tree Collapse file tree 1 file changed +22
-0
lines changed Original file line number Diff line number Diff line change
1
+ [advisory ]
2
+ id = " RUSTSEC-0000-0000"
3
+ package = " claxon"
4
+ date = " 2018-08-25"
5
+ title = " Malicious input could cause uninitialized memory to be exposed"
6
+ description = """
7
+ Affected versions of Claxon made an invalid assumption about the decode buffer
8
+ size being a multiple of a value read from the bitstream. This could cause parts
9
+ of the decode buffer to not be overwritten. If the decode buffer was newly
10
+ allocated and uninitialized, this uninitialized memory could be exposed.
11
+
12
+ This allows an attacker to observe parts of the uninitialized memory in the
13
+ decoded audio stream.
14
+
15
+ The flaw was corrected by checking that the value read from the bistream divides
16
+ the decode buffer size, and returning a format error if it does not. If an error
17
+ is returned, the decode buffer is not exposed. Regression tests and an
18
+ additional fuzzer have been added to prevent similar flaws in the future.
19
+ """
20
+ patched_versions = [" =0.3.2" , " >= 0.4.1" ]
21
+ url = " https://github.com/ruuda/claxon/commit/8f28ec275e412dd3af4f3cda460605512faf332c"
22
+ keywords = [" uninitialized-memory" ]
You can’t perform that action at this time.
0 commit comments