You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Cloudflare version of zlib library was found to be vulnerable to memory corruption issues affecting the deflation algorithm implementation (deflate.c). The issues resulted from improper input validation and heap-based buffer overflow.
A local attacker could exploit the problem during compression using a crafted malicious file potentially leading to denial of service of the software.
Patches: The issue has been patched in commit 8352d10 cloudflare/zlib@8352d10 . The upstream repository is not affected.
CVE-2023-6992 - Medium Severity Vulnerability
Cloudflare fork of zlib with massive performance improvements
Library home page: https://crates.io/api/v1/crates/cloudflare-zlib-sys/0.2.0/download
Path to dependency file: /third_party/rust_crates/vendor/flate2/Cargo.toml
Path to vulnerable library: /third_party/rust_crates/vendor/flate2/Cargo.toml
Dependency Hierarchy:
Found in HEAD commit: 4ec0c406a28f193fe6e7376ee7696cca0532d4ba
Found in base branch: master
Cloudflare version of zlib library was found to be vulnerable to memory corruption issues affecting the deflation algorithm implementation (deflate.c). The issues resulted from improper input validation and heap-based buffer overflow.
A local attacker could exploit the problem during compression using a crafted malicious file potentially leading to denial of service of the software.
Patches: The issue has been patched in commit 8352d10 cloudflare/zlib@8352d10 . The upstream repository is not affected.
Publish Date: 2024-01-04
URL: CVE-2023-6992
Base Score Metrics:
Step up your Open Source Security Game with Mend here
The text was updated successfully, but these errors were encountered: