RUSTSEC-2022-0066

Source
https://github.com/rustsec/advisory-db/blob/osv/crates/RUSTSEC-2022-0066.json
Aliases
Published
2022-10-30T12:00:00Z
Modified
2022-11-02T22:38:38Z
Details

Prior to version 0.4.2, conduit-hyper did not check any limit on a request's length before calling hyper::body::to_bytes. An attacker could send a malicious request with an abnormally large Content-Length, which could lead to a panic if memory allocation failed for that request.

In version 0.4.2, conduit-hyper sets an internal limit of 128 MiB per request, otherwise returning status 400 ("Bad Request").

References

Affected packages

crates.io / conduit-hyper

conduit-hyper

Affected ranges

Type
SEMVER
Events
Introduced
0.2.0-alpha.3
Fixed
0.4.2

Affected versions

Ecosystem specific

{
    "affects": {
        "arch": [],
        "functions": [],
        "os": []
    }
}

Database specific

{
    "cvss": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
    "categories": [
        "denial-of-service"
    ],
    "informational": null
}