CVE-2021-32714

See a problem?
Source
https://nvd.nist.gov/vuln/detail/CVE-2021-32714
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2021-32714.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2021-32714
Aliases
Related
Published
2021-07-07T20:15:08Z
Modified
2024-09-11T02:00:06Z
Severity
  • 9.1 (Critical) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H CVSS Calculator
Summary
[none]
Details

hyper is an HTTP library for Rust. In versions prior to 0.14.10, hyper's HTTP server and client code had a flaw that could trigger an integer overflow when decoding chunk sizes that are too big. This allows possible data loss, or if combined with an upstream HTTP proxy that allows chunk sizes larger than hyper does, can result in "request smuggling" or "desync attacks." The vulnerability is patched in version 0.14.10. Two possible workarounds exist. One may reject requests manually that contain a Transfer-Encoding header or ensure any upstream proxy rejects Transfer-Encoding chunk sizes greater than what fits in 64-bit unsigned integers.

References

Affected packages

Debian:12 / rust-hyper

Package

Name
rust-hyper
Purl
pkg:deb/debian/rust-hyper?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.14.19-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:13 / rust-hyper

Package

Name
rust-hyper
Purl
pkg:deb/debian/rust-hyper?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.14.19-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}