DirectorySecurity Advisories
Sign In
Security Advisories

CGA-mq25-568g-hr6q

Published

Last updated

https://images.chainguard.dev/security/CGA-mq25-568g-hr6q
Package

zed

Latest Update
Fixed
Fixed Version

0.146.3-r0

Aliases
  • CVE-2020-25574
  • GHSA-x7vr-c387-8w57

Severity

7.5

High

CVSS V3

Summary

Integer Overflow/Infinite Loop in the http crate

Description

HeaderMap::reserve() used usize::next_power_of_two() to calculate the increased capacity. However, next_power_of_two() silently overflows to 0 if given a sufficiently large number in release mode.

If the map was not empty when the overflow happens, the library will invoke self.grow(0) and start infinite probing. This allows an attacker who controls the argument to reserve() to cause a potential denial of service (DoS).

The flaw was corrected in 0.1.20 release of http crate.

References

Updates


Safe Source for Open Sourceâ„¢
Media KitContact Us
© 2024 Chainguard. All Rights Reserved.
Private PolicyTerms of Use

Product

Chainguard Images