io.github.ndsev:zserio-runtime@2.5.0

  • latest version

    2.18.1

  • latest non vulnerable version

  • first published

    4 years ago

  • latest version published

    16 days ago

  • licenses detected

  • package registry

  • Direct Vulnerabilities

    Known vulnerabilities in the io.github.ndsev:zserio-runtime package. This does not include vulnerabilities belonging to this package’s dependencies.

    Fix vulnerabilities automatically

    Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

    Fix for free
    VulnerabilityVulnerable Version
    • H
    Memory Allocation with Excessive Size Value

    Affected versions of this package are vulnerable to Memory Allocation with Excessive Size Value via the deserialization process. An attacker can cause excessive memory allocation leading to process crashes by submitting a specially crafted payload.

    How to fix Memory Allocation with Excessive Size Value?

    Upgrade io.github.ndsev:zserio-runtime to version 2.18.1 or higher.

    [,2.18.1)
    • H
    Integer Overflow or Wraparound

    Affected versions of this package are vulnerable to Integer Overflow or Wraparound via the readBytes or readString functions in BitStreamReader when the setBitPosition process receives an overflowed value, bypassing bounds checks. An attacker can cause a segmentation fault and potentially crash the application by supplying crafted input that triggers the reading of an excessive number of bytes from a small buffer.

    How to fix Integer Overflow or Wraparound?

    Upgrade io.github.ndsev:zserio-runtime to version 2.18.1 or higher.

    [,2.18.1)