You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Zlib in versions v0.8 to v1.2.11 is vulnerable to use-of-uninitialized-value in inflate.
There are a couple of places in inflate() where UPDATE is called with state->check as its first parameter, without a guarantee that this value has been initialized (state comes from a ZALLOC in inflateInit). This causes use of uninitialized check value.
mend-bolt-for-githubbot
changed the title
WS-2020-0368 (Medium) detected in libz-sys-1.1.3.crate, libgit2-sys-0.12.23+1.2.0.crate
WS-2020-0368 (Medium) detected in libgit2-sys-0.12.23+1.2.0.crate
Jan 6, 2023
mend-bolt-for-githubbot
changed the title
WS-2020-0368 (Medium) detected in libgit2-sys-0.12.23+1.2.0.crate
WS-2020-0368 (Medium) detected in libgit2-sys-0.12.23+1.2.0.crate - autoclosed
Jan 24, 2023
✔️ This issue was automatically closed by Mend because the vulnerable library in the specific branch(es) was either marked as ignored or it is no longer part of the Mend inventory.
mend-bolt-for-githubbot
changed the title
WS-2020-0368 (Medium) detected in libgit2-sys-0.12.23+1.2.0.crate - autoclosed
WS-2020-0368 (Medium) detected in libgit2-sys-0.12.23+1.2.0.crate, libz-sys-1.1.3.crate
Nov 1, 2024
WS-2020-0368 - Medium Severity Vulnerability
Vulnerable Libraries - libgit2-sys-0.12.23+1.2.0.crate, libz-sys-1.1.3.crate
libgit2-sys-0.12.23+1.2.0.crate
Native bindings to the libgit2 library
Library home page: https://crates.io/api/v1/crates/libgit2-sys/0.12.23+1.2.0/download
Path to dependency file: /Cargo.toml
Path to vulnerable library: /Cargo.toml
Dependency Hierarchy:
libz-sys-1.1.3.crate
Low-level bindings to the system libz library (also known as zlib).
Library home page: https://crates.io/api/v1/crates/libz-sys/1.1.3/download
Path to dependency file: /Cargo.toml
Path to vulnerable library: /Cargo.toml
Dependency Hierarchy:
Found in HEAD commit: 8442595dc68076584ca77572fc42224085fe9ae5
Found in base branch: main
Vulnerability Details
Zlib in versions v0.8 to v1.2.11 is vulnerable to use-of-uninitialized-value in inflate.
There are a couple of places in inflate() where UPDATE is called with state->check as its first parameter, without a guarantee that this value has been initialized (state comes from a ZALLOC in inflateInit). This causes use of uninitialized check value.
Publish Date: 2020-02-22
URL: WS-2020-0368
CVSS 3 Score Details (6.5)
Base Score Metrics:
Step up your Open Source Security Game with Mend here
The text was updated successfully, but these errors were encountered: