Advisory Database
  • Advisories
  • Dependency Scanning
  1. cargo
  2. ›
  3. multihash
  4. ›
  5. CVE-2020-35909

CVE-2020-35909: Unexpected panic in multihash

August 25, 2021 (updated June 13, 2023)

In versions prior 0.11.3 it’s possible to make from_slice panic by feeding it certain malformed input. It’s never documented that from_slice (and from_bytes which wraps it) can panic, and its’ return type (Result<Self, DecodeError>) suggests otherwise. In practice, from_slice/from_bytes is frequently used in networking code and is being called with unsanitized data from untrusted sources. This can allow attackers to cause DoS by causing an unexpected panic in the network client’s code..

References

  • github.com/advisories/GHSA-h7qh-3h6f-w79p
  • github.com/multiformats/rust-multihash
  • github.com/multiformats/rust-multihash/pull/72
  • nvd.nist.gov/vuln/detail/CVE-2020-35909
  • rustsec.org/advisories/RUSTSEC-2020-0068.html

Code Behaviors & Features

Detect and mitigate CVE-2020-35909 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 0.11.3

Fixed versions

  • 0.11.3

Solution

Upgrade to version 0.11.3 or above.

Impact 7.5 HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Learn more about CVSS

Weakness

  • CWE-20: Improper Input Validation

Source file

cargo/multihash/CVE-2020-35909.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:15:28 +0000.