Логотип exploitDog
bind:CVE-2023-28638
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2023-28638

Количество 2

Количество 2

nvd логотип

CVE-2023-28638

почти 3 года назад

Snappier is a high performance C# implementation of the Snappy compression algorithm. This is a buffer overrun vulnerability that can affect any user of Snappier 1.1.0. In this release, much of the code was rewritten to use byte references rather than pointers to pinned buffers. This change generally improves performance and reduces workload on the garbage collector. However, when the garbage collector performs compaction and rearranges memory, it must update any byte references on the stack to refer to the updated location. The .NET garbage collector can only update these byte references if they still point within the buffer or to a point one byte past the end of the buffer. If they point outside this area, the buffer itself may be moved while the byte reference stays the same. There are several places in 1.1.0 where byte references very briefly point outside the valid areas of buffers. These are at locations in the code being used for buffer range checks. While the invalid references

CVSS3: 7
EPSS: Низкий
github логотип

GHSA-838x-pcvx-6p5w

почти 3 года назад

Snappier vulnerable to buffer overrun due to improper restriction of operations within the bounds of a memory buffer

CVSS3: 7
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2023-28638

Snappier is a high performance C# implementation of the Snappy compression algorithm. This is a buffer overrun vulnerability that can affect any user of Snappier 1.1.0. In this release, much of the code was rewritten to use byte references rather than pointers to pinned buffers. This change generally improves performance and reduces workload on the garbage collector. However, when the garbage collector performs compaction and rearranges memory, it must update any byte references on the stack to refer to the updated location. The .NET garbage collector can only update these byte references if they still point within the buffer or to a point one byte past the end of the buffer. If they point outside this area, the buffer itself may be moved while the byte reference stays the same. There are several places in 1.1.0 where byte references very briefly point outside the valid areas of buffers. These are at locations in the code being used for buffer range checks. While the invalid references

CVSS3: 7
1%
Низкий
почти 3 года назад
github логотип
GHSA-838x-pcvx-6p5w

Snappier vulnerable to buffer overrun due to improper restriction of operations within the bounds of a memory buffer

CVSS3: 7
1%
Низкий
почти 3 года назад

Уязвимостей на страницу