hello-world.rs
hello-world.rs copied to clipboard
CVE-2022-32206 (Medium) detected in curl-sys-0.4.55+curl-7.83.1.crate
CVE-2022-32206 - Medium Severity Vulnerability
Vulnerable Library - curl-sys-0.4.55+curl-7.83.1.crate
Native bindings to the libcurl library
Library home page: https://crates.io/api/v1/crates/curl-sys/0.4.55+curl-7.83.1/download
Dependency Hierarchy:
- tensorflow-0.17.0.crate (Root Library)
- tensorflow-sys-0.20.0.crate
- curl-0.4.43.crate
- :x: curl-sys-0.4.55+curl-7.83.1.crate (Vulnerable Library)
- curl-0.4.43.crate
- tensorflow-sys-0.20.0.crate
Found in HEAD commit: a5a175063bd51fcbbce0eaba88d1b9b6ad315911
Found in base branch: master
Vulnerability Details
curl < 7.84.0 supports "chained" HTTP compression algorithms, meaning that a serverresponse can be compressed multiple times and potentially with different algorithms. The number of acceptable "links" in this "decompression chain" was unbounded, allowing a malicious server to insert a virtually unlimited number of compression steps.The use of such a decompression chain could result in a "malloc bomb", makingcurl end up spending enormous amounts of allocated heap memory, or trying toand returning out of memory errors.
Publish Date: 2022-07-07
URL: CVE-2022-32206
CVSS 3 Score Details (6.5)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
Suggested Fix
Type: Upgrade version
Release Date: 2022-06-02
Fix Resolution: curl-7_84_0
Step up your Open Source Security Game with Mend here