Buffer Overflow Affecting transpose package, versions >=0.1.0 <0.2.3


Severity

Recommended
0.0
high
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-RUST-TRANSPOSE-6253997
  • published20 Feb 2024
  • disclosed18 Dec 2023
  • creditCai Bear

Introduced: 18 Dec 2023

CVE NOT AVAILABLE CWE-120  (opens in a new tab)

How to fix?

Upgrade transpose to version 0.2.3 or higher.

Overview

Affected versions of this package are vulnerable to Buffer Overflow due to the safety check input_width * input_height == output.len() potentially failing because of input_width * input_height overflowing in such a way that it equals output.len(), memory past the end of output can be written to.

Note:

Exploiting this flaw requires the caller to provide input_width and input_height arguments that, when multiplied, overflow, and the overflowed result matches the lengths of the input and output slices.

CVSS Scores

version 3.1