In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsUpgrade transpose
to version 0.2.3 or higher.
Affected versions of this package are vulnerable to Buffer Overflow due to the safety check input_width * input_height == output.len()
potentially failing because of input_width * input_height
overflowing in such a way that it equals output.len()
, memory past the end of output
can be written to.
Note:
Exploiting this flaw requires the caller to provide input_width
and input_height
arguments that, when multiplied, overflow, and the overflowed result matches the lengths of the input and output slices.