hello-world.rs icon indicating copy to clipboard operation
hello-world.rs copied to clipboard

CVE-2022-32206 (Medium) detected in curl-sys-0.4.55+curl-7.83.1.crate

Open mend-bolt-for-github[bot] opened this issue 3 years ago • 0 comments
trafficstars

CVE-2022-32206 - Medium Severity Vulnerability

Vulnerable Library - curl-sys-0.4.55+curl-7.83.1.crate

Native bindings to the libcurl library

Library home page: https://crates.io/api/v1/crates/curl-sys/0.4.55+curl-7.83.1/download

Dependency Hierarchy:

  • tensorflow-0.17.0.crate (Root Library)
    • tensorflow-sys-0.20.0.crate
      • curl-0.4.43.crate
        • :x: curl-sys-0.4.55+curl-7.83.1.crate (Vulnerable Library)

Found in HEAD commit: a5a175063bd51fcbbce0eaba88d1b9b6ad315911

Found in base branch: master

Vulnerability Details

curl < 7.84.0 supports "chained" HTTP compression algorithms, meaning that a serverresponse can be compressed multiple times and potentially with different algorithms. The number of acceptable "links" in this "decompression chain" was unbounded, allowing a malicious server to insert a virtually unlimited number of compression steps.The use of such a decompression chain could result in a "malloc bomb", makingcurl end up spending enormous amounts of allocated heap memory, or trying toand returning out of memory errors.

Publish Date: 2022-07-07

URL: CVE-2022-32206

CVSS 3 Score Details (6.5)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: Required
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: None
    • Integrity Impact: None
    • Availability Impact: High
For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Release Date: 2022-06-02

Fix Resolution: curl-7_84_0


Step up your Open Source Security Game with Mend here