The phonenumber parsing code may panic due to a reachable assert! guard on the phonenumber string.
In a typical deployment of rust-phonenumber, this may get triggered by feeding a maliciously crafted phonenumber, e.g. over the network, specifically strings of the form +dwPAA;phone-context=AA, where the "number" part potentially parses as a number larger than 2^56.
Since f69abee1/0.3.4/#52.
0.2.x series is not affected.
Upgrade to 0.3.6 or higher.
n/a
Whereas https://github.com/whisperfish/rust-phonenumber/issues/69 did not provide an example code path, property testing found a few: +dwPAA;phone-context=AA.
{
"github_reviewed": true,
"severity": "CRITICAL",
"cwe_ids": [
"CWE-1284",
"CWE-248",
"CWE-392"
],
"nvd_published_at": "2024-07-09T15:15:11Z",
"github_reviewed_at": "2024-07-09T14:13:48Z"
}