Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLWg3cWgtM2g2Zi13Nzlw
Unexpected panic in multihash
In versions prior 0.11.3 it's possible to make from_slice panic by feeding it certain malformed input. It's never documented that from_slice (and from_bytes which wraps it) can panic, and its' return type (Result<Self, DecodeError>) suggests otherwise. In practice, from_slice/from_bytes is frequently used in networking code and is being called with unsanitized data from untrusted sources. This can allow attackers to cause DoS by causing an unexpected panic in the network client's code..
Permalink: https://github.com/advisories/GHSA-h7qh-3h6f-w79pJSON: https://advisories.ecosyste.ms/api/v1/advisories/MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLWg3cWgtM2g2Zi13Nzlw
Source: GitHub Advisory Database
Origin: Unspecified
Severity: High
Classification: General
Published: about 3 years ago
Updated: over 1 year ago
CVSS Score: 7.5
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Identifiers: GHSA-h7qh-3h6f-w79p, CVE-2020-35909
References:
- https://nvd.nist.gov/vuln/detail/CVE-2020-35909
- https://github.com/multiformats/rust-multihash/pull/72
- https://rustsec.org/advisories/RUSTSEC-2020-0068.html
- https://github.com/advisories/GHSA-h7qh-3h6f-w79p
Blast Radius: 25.9
Affected Packages
cargo:multihash
Dependent packages: 150Dependent repositories: 2,847
Downloads: 16,075,239 total
Affected Version Ranges: < 0.11.3
Fixed in: 0.11.3
All affected versions: 0.1.0, 0.3.0, 0.4.0, 0.4.1, 0.4.2, 0.5.0, 0.5.1, 0.5.2, 0.6.0, 0.7.0, 0.8.0, 0.9.0, 0.9.1, 0.9.2, 0.9.3, 0.9.4, 0.10.0, 0.10.1, 0.11.0, 0.11.1, 0.11.2
All unaffected versions: 0.11.3, 0.11.4, 0.12.0, 0.13.0, 0.13.1, 0.13.2, 0.14.0, 0.15.0, 0.16.0, 0.16.1, 0.16.2, 0.16.3, 0.17.0, 0.18.0, 0.18.1, 0.19.0, 0.19.1, 0.19.2