GHSA-h6xw-mghq-7523

Suggest an improvement
Source
https://github.com/advisories/GHSA-h6xw-mghq-7523
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/04/GHSA-h6xw-mghq-7523/GHSA-h6xw-mghq-7523.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-h6xw-mghq-7523
Aliases
Published
2022-04-08T00:00:24Z
Modified
2023-11-08T04:09:00.935111Z
Severity
  • 5.3 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:H CVSS Calculator
Summary
Unsafe parsing in SWHKD
Details

SWHKD 1.1.5 allows unsafe parsing via the -c option. An information leak might occur but there is a simple denial of service (memory exhaustion) upon an attempt to parse a large or infinite file (such as a block or character device).

Database specific
{
    "nvd_published_at": "2022-04-07T02:15:00Z",
    "cwe_ids": [
        "CWE-400",
        "CWE-770"
    ],
    "severity": "MODERATE",
    "github_reviewed": true,
    "github_reviewed_at": "2022-04-08T22:12:17Z"
}
References

Affected packages

crates.io / Simple-Wayland-HotKey-Daemon

Package

Name
Simple-Wayland-HotKey-Daemon
View open source insights on deps.dev
Purl
pkg:cargo/Simple-Wayland-HotKey-Daemon

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.2.0