Skip to content

Unsafe parsing in SWHKD

Moderate severity GitHub Reviewed Published Apr 8, 2022 to the GitHub Advisory Database • Updated Aug 17, 2023

Package

cargo Simple-Wayland-HotKey-Daemon (Rust)

Affected versions

< 1.2.0

Patched versions

1.2.0

Description

SWHKD 1.1.5 allows unsafe parsing via the -c option. An information leak might occur but there is a simple denial of service (memory exhaustion) upon an attempt to parse a large or infinite file (such as a block or character device).

References

Published by the National Vulnerability Database Apr 7, 2022
Published to the GitHub Advisory Database Apr 8, 2022
Reviewed Apr 8, 2022
Last updated Aug 17, 2023

Severity

Moderate
5.3
/ 10

CVSS base metrics

Attack vector
Local
Attack complexity
High
Privileges required
None
User interaction
Required
Scope
Unchanged
Confidentiality
Low
Integrity
None
Availability
High
CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:H

CVE ID

CVE-2022-27819

GHSA ID

GHSA-h6xw-mghq-7523

Source code

Credits

Loading Checking history
See something to contribute? Suggest improvements for this vulnerability.