An open API service providing security vulnerability metadata for many open source software ecosystems.

Security Advisories: GSA_kwCzR0hTQS1wbWN2LW1nY2YtcnZ4Z84AArrB

Non-aligned u32 read in Chacha20 encryption and decryption

The implementation does not enforce alignment requirements on input slices while incorrectly assuming 4-byte alignment through an unsafe call to std::slice::from_raw_parts_mut, which breaks the contract and introduces undefined behavior.

This affects Chacha20 encryption and decryption in crypto2.

Source: GitHub Advisory Database
Origin: Unspecified
Severity: High
Classification: General
Published: almost 2 years ago
Updated: 10 months ago

Identifiers: GHSA-pmcv-mgcf-rvxg
References: Repository:
Blast Radius: 0.0

Affected Packages

Dependent packages: 2
Dependent repositories: 20
Downloads: 36,736 total
Affected Version Ranges: <= 0.1.2
No known fixed version
All affected versions: 0.1.0, 0.1.1, 0.1.2