We found results for “”
WS-2021-0634
Good to know:
Date: November 3, 2024
A memory safety issue was found in mz-avro in Rust. Arbitrary Read implementations can read from the uninitialized buffer and also can return an incorrect number of bytes written to the buffer. Reading from uninitialized memory produces undefined values that can quickly invoke undefined behavior. Note: This is relevant only where a user provides a struct whose Read implementation inspects the buffer passed to read_exact before writing to it. Version 0.7.0 of this crate contains a patch for this issue.
Language: RUST
Severity Score
Related Resources (5)
Severity Score
Weakness Type (CWE)
Use of Uninitialized Resource
CWE-908Top Fix
CVSS v3.1
Base Score: |
|
---|---|
Attack Vector (AV): | NETWORK |
Attack Complexity (AC): | LOW |
Privileges Required (PR): | LOW |
User Interaction (UI): | NONE |
Scope (S): | UNCHANGED |
Confidentiality (C): | NONE |
Integrity (I): | NONE |
Availability (A): | HIGH |