The blurhash parsing code may panic due to multiple panic-guarded out-of-bounds accesses on untrusted input.
In a typical deployment, this may get triggered by feeding a maliciously crafted blurhashes over the network. These may include: - UTF-8 compliant strings containing multi-byte UTF-8 characters
The patches will be released under version 0.2.0, which requires user intervention because of slight API churn.
n.a.
n.a.
{
"severity": "HIGH",
"github_reviewed": true,
"cwe_ids": [
"CWE-1284",
"CWE-392"
],
"nvd_published_at": "2023-09-19T15:15:57Z",
"github_reviewed_at": "2023-09-21T17:10:22Z"
}