{"id":"RUSTSEC-2023-0038","summary":"Out-of-bounds array access leads to panic","details":"Affected versions of the crate have several bugs where\nattacker-controlled input can result in the use of an out-of-bound\narray index.  Rust detects the use of the out-of-bound index and\ncauses the application to panic.  An attacker may be able to use this\nto cause a denial-of-service.  However, it is not possible for an\nattacker to read from or write to the application's address space.","aliases":["CVE-2023-53160","GHSA-25mx-8f3v-8wh7"],"modified":"2025-10-28T06:02:18Z","published":"2023-05-16T12:00:00Z","database_specific":{"license":"CC0-1.0"},"references":[{"type":"PACKAGE","url":"https://crates.io/crates/sequoia-openpgp"},{"type":"ADVISORY","url":"https://rustsec.org/advisories/RUSTSEC-2023-0038.html"},{"type":"WEB","url":"https://lists.sequoia-pgp.org/hyperkitty/list/announce@lists.sequoia-pgp.org/thread/SN2E3QRT4DMQ5JNEK6VIN6DJ5SH766DI/"},{"type":"WEB","url":"https://gitlab.com/sequoia-pgp/sequoia/-/tags/openpgp%2Fv1.16.0"}],"affected":[{"package":{"name":"sequoia-openpgp","ecosystem":"crates.io","purl":"pkg:cargo/sequoia-openpgp"},"ranges":[{"type":"SEMVER","events":[{"introduced":"0.0.0-0"},{"fixed":"1.1.1"},{"introduced":"1.2.0"},{"fixed":"1.8.1"},{"introduced":"1.9.0"},{"fixed":"1.16.0"}]}],"ecosystem_specific":{"affected_functions":null,"affects":{"functions":[],"arch":[],"os":[]}},"database_specific":{"cvss":null,"source":"https://github.com/rustsec/advisory-db/blob/osv/crates/RUSTSEC-2023-0038.json","categories":["denial-of-service"],"informational":null}}],"schema_version":"1.7.3"}