logo

CVE-2023-53157 rosenpass

Package

Manager: cargo
Name: rosenpass
Vulnerable Version: >=0 <0.2.1

Severity

Level: Medium

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N

EPSS: 0.00186 pctl0.40631

Details

Remotely exploitable denial of service in Rosenpass Affected versions of this crate did not validate the size of buffers when attempting to decode messages. This allows an attacker to trigger a panic by sending a UDP datagram with a 1 byte payload over network. This flaw was corrected by validating the size of the buffers before attempting to decode the message.

Metadata

Created: 2023-12-21T23:15:57Z
Modified: 2025-07-28T15:08:43Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/12/GHSA-6ggr-cwv4-g7qg/GHSA-6ggr-cwv4-g7qg.json
CWE IDs: ["CWE-130"]
Alternative ID: GHSA-6ggr-cwv4-g7qg
Finding: F052
Auto approve: 1