Use of a Broken or Risky Cryptographic Algorithm in crypto2
Critical severity
GitHub Reviewed
Published
Jan 6, 2022
to the GitHub Advisory Database
•
Updated Aug 17, 2023
Description
Published by the National Vulnerability Database
Dec 27, 2021
Reviewed
Jan 5, 2022
Published to the GitHub Advisory Database
Jan 6, 2022
Last updated
Aug 17, 2023
The implementation does not enforce alignment requirements on input slices while incorrectly assuming 4-byte alignment through an unsafe call to std::slice::from_raw_parts_mut, which breaks the contract and introduces undefined behavior.
This affects Chacha20 encryption and decryption in crypto2.
References