-
Notifications
You must be signed in to change notification settings - Fork 147
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
RUSTSEC-2021-0131: Integer overflow in the bundled Brotli C library #439
Comments
This only affects our Configuration Admission Controller Webhook, which is rarely if ever used. The webhook brings this in via |
Issue has been automatically marked as stale due to inactivity for 90 days. Update the issue to remove label, otherwise it will be automatically closed. |
Issue has been automatically marked as stale due to inactivity for 90 days. Update the issue to remove label, otherwise it will be automatically closed. |
dependency on actix-web had been updated, we no longer have dependency on brotli-sys. |
brotli-sys
0.3.2
A buffer overflow exists in the Brotli library versions prior to 1.0.8 where an attacker controlling the input length of a "one-shot" decompression request to a script can trigger a crash, which happens when copying over chunks of data larger than 2 GiB.
An updated version of
brotli-sys
has not been released. If one cannot update the C library, its authors recommend to use the "streaming" API as opposed to the "one-shot" API, and impose chunk size limits.In Rust the issue can be mitigated by migrating to the
brotli
crate, which provides a Rust implementation of Brotli compression and decompression that is not affected by this issue.See advisory page for additional details.
The text was updated successfully, but these errors were encountered: