
Cloud Vulnerability DB
A community-led vulnerabilities database
RUSTSEC-2023-0038 is a vulnerability in the sequoia-openpgp Rust library that leads to out-of-bounds array access resulting in a panic. The issue was discovered in May 2023 and affects all versions of sequoia-openpgp since its initial 1.0 release until version 1.16.0, which contains the fix. The vulnerability is present in the packet parser component of the library (Sequoia Announce).
The vulnerability is caused by a parsing error where attacker-controlled input can trigger the packet parser to access an array using an out-of-range array index. Due to Rust's safety mechanisms, this results in a panic rather than memory corruption. The issue was independently discovered by Paul Schaub (vanitasvitae) and Alexander Kjäll (capitol), and was subsequently patched by Justus Winter (Sequoia Announce).
The vulnerability has been classified as low severity since it can only be exploited to cause a program crash (denial of service) through a panic. The attacker cannot read from or write to the process's address space, limiting the potential impact to service disruption (Sequoia Announce).
The vulnerability has been fixed in sequoia-openpgp version 1.16.0. Additionally, backported fixes are available in version 1.8.1 for Debian Testing and version 1.1.1 for Debian Stable. Users are recommended to upgrade to these patched versions to mitigate the vulnerability (Sequoia Announce).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."