We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
1 parent dc1d79c commit 2010721Copy full SHA for 2010721
crates/rosenpass/RUSTSEC-0000-0000.md
@@ -0,0 +1,21 @@
1
+```toml
2
+[advisory]
3
+id = "RUSTSEC-0000-0000"
4
+package = "rosenpass"
5
+date = "2023-11-04"
6
+references = ["https://github.com/rosenpass/rosenpass/commit/93439858d1c44294a7b377f775c4fc897a370bb2"]
7
+categories = ["denial-of-service"]
8
+keywords = ["remote", "single-byte"]
9
+license = "CC0-1.0"
10
+
11
+[versions]
12
+patched = [">= 0.2.1"]
13
+```
14
15
+# Remotely exploitable DoS condition in Rosenpass <=0.2.0
16
17
+Affected version do this crate did not validate the size of buffers when attempting to decode messages.
18
19
+This allows an attacker to trigger a panic by sending a UDP datagram with a 1 byte payload over network.
20
21
+This flaw was corrected by validating the size of the buffers before attempting to decode the message.
0 commit comments