First published: Tue Apr 01 2025(Updated: )
A vulnerability was found in ouch-org ouch up to 0.3.1. It has been classified as critical. This affects the function ouch::archive::zip::convert_zip_date_time of the file zip.rs. The manipulation of the argument month leads to memory corruption. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used. Upgrading to version 0.4.0 is able to address this issue. It is recommended to upgrade the affected component.
Affected Software | Affected Version | How to fix |
---|---|---|
rust/ouch | <0.4.0 | 0.4.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of GHSA-6xfj-hhwh-r3c2 is classified as critical.
To fix GHSA-6xfj-hhwh-r3c2, upgrade the ouch package to version 0.4.0 or later.
GHSA-6xfj-hhwh-r3c2 is a memory corruption vulnerability.
GHSA-6xfj-hhwh-r3c2 is located in the function ouch::archive::zip::convert_zip_date_time in the file zip.rs.
Yes, the exploitation of GHSA-6xfj-hhwh-r3c2 requires local access.