CVE-2022-39294 (DoS) Denial of Service from unchecked request length in conduit-hyper. Prior to version 0.4.2, `conduit-hyper` did not check request length, leading to potential memory allocation failure and panic. Version 0.4.2 sets a 128 MiB limit per request
Reporter | Title | Published | Views | Family All 9 |
---|---|---|---|---|
![]() | CVE-2022-39294 | 31 Oct 202219:15 | – | nvd |
![]() | CVE-2022-39294 | 5 Feb 202519:36 | – | redhatcve |
![]() | Design/Logic Flaw | 31 Oct 202219:15 | – | prion |
![]() | conduit-hyper vulnerable to Denial of Service from unchecked request length | 31 Oct 202218:44 | – | github |
![]() | conduit-hyper vulnerable to Denial of Service from unchecked request length | 31 Oct 202218:44 | – | osv |
![]() | Denial of Service from unchecked request length | 30 Oct 202212:00 | – | osv |
![]() | CVE-2022-39294 | 31 Oct 202219:15 | – | osv |
![]() | CVE-2022-39294 | 31 Oct 202219:15 | – | cve |
![]() | Denial of Service from unchecked request length | 30 Oct 202212:00 | – | rustsec |
[
{
"vendor": "conduit-rust",
"product": "conduit-hyper",
"versions": [
{
"version": ">= 0.2.0-alpha.3, < 0.4.2",
"status": "affected"
}
]
}
]
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo