-
Notifications
You must be signed in to change notification settings - Fork 145
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Properly disclose #148 and #149 #156
Comments
I can handle the advisories once the affected crate versions are determined |
Advisory for #148 is pending: rustsec/advisory-db#119 Still not entirely sure on the affected versions range for #149, but 0.6.3 and onwards are definitely affected, so please yank them. |
@Shnatsel do you know if the advisories to RustSec find their way into |
Once the PR for the advisory DB is merged it gets into |
For reference, RustSec advisories are also wired into @dependabot. This is what an automated security bumps looks like: coreos/afterburn#239. |
I've located the commit that introduced issue #149 , i.e. 675221e , in which |
@Phosphorus15 I do not believe commit 675221e is the one - it only modifies benchmarks, not the actual code. |
Advisory for #149 is up for review: rustsec/advisory-db#127 |
Thanks. Sorry for dropping the ball here. |
@jdm please yank versions 0.6.3 to 0.6.9 inclusive from crates.io. That way anyone using them will be upgraded to the fixed 0.6.10 automatically. It's the one part I cannot handle by myself. |
Done. |
Security advisory is merged too, so closing this. Thanks! |
Recently reported #148 and #149 are memory safety issues and may be exploitable. They need to be properly disclosed:
I have tried to track down the commits that introduced these bugs:
grow
to shrink can cause corruption. #149 being introduced in b24b3d2 but that doesn't make sense to me. If I am correct, that would make 0.6.3 and later vulnerable; possibly 0.6.2 as well but there is no 0.6.2 tag in git, so cannot check that.The testcase I'm using to check for #149 is as follows:
The text was updated successfully, but these errors were encountered: