RUSTSEC-2022-0068

Source
https://rustsec.org/advisories/RUSTSEC-2022-0068
Import Source
https://github.com/rustsec/advisory-db/blob/osv/crates/RUSTSEC-2022-0068.json
Aliases
Published
2022-11-30T12:00:00Z
Modified
2023-11-08T04:10:54.980908Z
Details

If a message consumer expects data of type "list of pointers", and if the consumer performs certain specific actions on such data, then a message producer can cause the consumer to read out-of-bounds memory. This could trigger a process crash in the consumer, or in some cases could allow exfiltration of private in-memory data.

The C++ Cap'n Proto library is also affected by this bug. See the advisory on the main Cap'n Proto repo for a succinct description of the exact circumstances in which the problem can arise.

References

Affected packages

crates.io / capnp

Package

Name
capnp

Affected ranges

Type
SEMVER
Events
Introduced
0.0.0-0
Fixed
0.13.7
Introduced
0.14.0-0
Fixed
0.14.11
Introduced
0.15.0-0
Fixed
0.15.2

Ecosystem specific

{
    "affects": {
        "os": [],
        "functions": [],
        "arch": []
    }
}

Database specific

{
    "cvss": null,
    "informational": null,
    "categories": [
        "memory-exposure"
    ]
}