- Reported
- 
        
      
- Issued
- 
        
        
        
        
      
- Package
- 
        
        
        simd-json
          (crates.io)
        
        
      
- Type
- 
        
        Vulnerability
        
      
- Keywords
- 
        
          #simd
        
      
- Aliases
- 
        
      
- References
- 
        
      
- CVSS Score
- 7.5 
        HIGH
      
- CVSS Details
- 
        
          
            - Attack Vector
- Network
- Attack Complexity
- Low
- Privileges Required
- None
- User Interaction
- None
- Scope
- Unchanged
- Confidentiality Impact
- None
- Integrity Impact
- None
- Availability Impact
- High
 
- CVSS Vector
- CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
- Patched
- 
        
        
        
      
- Unaffected
- 
        
      
- Affected Architectures
- 
        
      
Description
    The affected version of this crate did not guard against accessing memory
beyond the range of its input data. A pointer cast to read the data into
a 256-bit register could lead to a segmentation fault when the end plus
the 32 bytes (256 bit) read would overlap into the next page during string
parsing.
page   |  ...  page 1  ...  | ... page 2  ... |
data   | x[n * 32 byte]xx__ |                 |
access | ..][ 32 byte ]     |                 |
segflt |               [ 32 | byte ]          |
This allows an attacker to eventually crash a service.
The flaw was corrected by using a padding buffer for the last read from the
input. So that we are we never read over the boundary of the input data.
    Advisory available under CC0-1.0
    license.