CVE-2026-29795

stellar-xdr is a library and CLI containing types and functionality for working with Stellar XDR. Prior to version 25.0.1, StringM::from_str does not validate that the input length is within the declared maximum (MAX). Calling StringM::<N>::from_str(s) where s is longer than N bytes succeeds and returns an Ok value instead of Err(Error::LengthExceedsMax), producing a StringM that violates its length invariant. This affects any code that constructs StringM values from string input using FromStr (including str::parse), and relies on the type's maximum length constraint being enforced. An oversized StringM could propagate through serialization, validation, or other logic that assumes the invariant holds. This issue has been patched in version 25.0.1.
Configurations

Configuration 1 (hide)

cpe:2.3:a:stellar:stellar-xdr:*:*:*:*:*:rust:*:*

History

18 Mar 2026, 18:46

Type Values Removed Values Added
First Time Stellar stellar-xdr
Stellar
CPE cpe:2.3:a:stellar:stellar-xdr:*:*:*:*:*:rust:*:*
Summary
  • (es) stellar-xdr es una librería y CLI que contiene tipos y funcionalidades para trabajar con Stellar XDR. Antes de la versión 25.0.1, StringM::from_str no valida que la longitud de entrada esté dentro del máximo declarado (MAX). Llamar a StringM::::from_str(s) donde s es más largo que N bytes tiene éxito y devuelve un valor Ok en lugar de Err(Error::LengthExceedsMax), produciendo un StringM que viola su invariante de longitud. Esto afecta a cualquier código que construye valores StringM a partir de una entrada de cadena usando FromStr (incluyendo str::parse), y que depende de que se aplique la restricción de longitud máxima del tipo. Un StringM sobredimensionado podría propagarse a través de la serialización, la validación u otra lógica que asume que el invariante se mantiene. Este problema ha sido parcheado en la versión 25.0.1.
References () https://github.com/stellar/rs-stellar-xdr/commit/1f840013c3e2fca0321fb844b048afa01d10dda6 - () https://github.com/stellar/rs-stellar-xdr/commit/1f840013c3e2fca0321fb844b048afa01d10dda6 - Patch
References () https://github.com/stellar/rs-stellar-xdr/issues/499 - () https://github.com/stellar/rs-stellar-xdr/issues/499 - Issue Tracking
References () https://github.com/stellar/rs-stellar-xdr/pull/500 - () https://github.com/stellar/rs-stellar-xdr/pull/500 - Issue Tracking, Patch
References () https://github.com/stellar/rs-stellar-xdr/security/advisories/GHSA-x57h-xx53-v53w - () https://github.com/stellar/rs-stellar-xdr/security/advisories/GHSA-x57h-xx53-v53w - Mitigation, Patch, Vendor Advisory

06 Mar 2026, 21:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-03-06 21:16

Updated : 2026-03-18 18:46


NVD link : CVE-2026-29795

Mitre link : CVE-2026-29795

CVE.ORG link : CVE-2026-29795


JSON object : View

Products Affected

stellar

  • stellar-xdr
CWE
CWE-770

Allocation of Resources Without Limits or Throttling