Integer Overflow or Wraparound Affecting prost-types package, versions <0.8.0


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

Exploit Maturity
Proof of concept
EPSS
0.12% (48th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-RUST-PROSTTYPES-1316312
  • published9 Jul 2021
  • disclosed8 Jul 2021
  • creditUnknown

Introduced: 8 Jul 2021

CVE-2021-38192  (opens in a new tab)
CWE-190  (opens in a new tab)

How to fix?

Upgrade prost-types to version 0.8.0 or higher.

Overview

prost-types is a Prost definitions of Protocol Buffers well known types. See the Protobuf reference for more information about well known types.

Affected versions of this package are vulnerable to Integer Overflow or Wraparound. Affected versions of this crate contained a bug in which untrusted input could cause an overflow and panic when converting a Timestamp to SystemTime. It is recommended to upgrade to prost-types v0.8 and switch the usage of From<Timestamp> for SystemTime to TryFrom<Timestamp> for SystemTime.

References

CVSS Scores

version 3.1