CVE-2023-53157 – rosenpass
Package
Manager: cargo
Name: rosenpass
Vulnerable Version: >=0 <0.2.1
Severity
Level: Medium
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
EPSS: 0.00186 pctl0.40631
Details
Remotely exploitable denial of service in Rosenpass Affected versions of this crate did not validate the size of buffers when attempting to decode messages. This allows an attacker to trigger a panic by sending a UDP datagram with a 1 byte payload over network. This flaw was corrected by validating the size of the buffers before attempting to decode the message.
Metadata
Created: 2023-12-21T23:15:57Z
Modified: 2025-07-28T15:08:43Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/12/GHSA-6ggr-cwv4-g7qg/GHSA-6ggr-cwv4-g7qg.json
CWE IDs: ["CWE-130"]
Alternative ID: GHSA-6ggr-cwv4-g7qg
Finding: F052
Auto approve: 1