We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
1 parent 3338fcf commit f53e4baCopy full SHA for f53e4ba
crates/rosenpass/RUSTSEC-0000-0000.md
@@ -0,0 +1,27 @@
1
+```toml
2
+[advisory]
3
+id = "RUSTSEC-0000-0000"
4
+
5
+package = "rosenpass"
6
7
+date = "2023-11-04"
8
9
+references = ["https://github.com/rosenpass/rosenpass/commit/93439858d1c44294a7b377f775c4fc897a370bb2"]
10
11
+categories = ["denial-of-service"]
12
13
+keywords = ["remote", "single-byte"]
14
15
+license = "CC0-1.0"
16
17
+[versions]
18
+patched = [">= 0.2.1"]
19
+```
20
21
+# Remotely exploitable DoS condition in Rosenpass <=0.2.0
22
23
+Affected version do this crate did not validate the size of buffers when attempting to decode messages.
24
25
+This allows an attacker to trigger a panic by sending a UDP datagram with a 1 byte payload over network.
26
27
+This flaw was corrected by validating the size of the buffers before attempting to decode the message.
0 commit comments