GHSA-fp5x-7m4q-449f
Rust Análisis y mitigación de vulnerabilidades

Vista general

The Direct Ring Buffer library contains a vulnerability (GHSA-fp5x-7m4q-449f) discovered in October 2025, affecting versions prior to 0.2.2. The issue involves uninitialized memory exposure in the createringbuffer function, which was identified as a low severity vulnerability. The vulnerability affects the Rust package directringbuffer and was confirmed through Miri testing (GitHub Advisory, RustSec Advisory).

Técnicas

The vulnerability stems from the createringbuffer function's implementation, which allocates a buffer using Vec::withcapacity followed by an unsafe setlen call, resulting in a Box<[T]> containing uninitialized memory. This implementation violates Rust's validity invariants when functions like writeslices attempt to create typed slices over the uninitialized memory. The vulnerability has been assigned a CVSS v4.0 score of 2.0 (Low) with the vector string CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P and is categorized under CWE-908 (Use of Uninitialized Resource) (GitHub Advisory, [Issue Report](https://github.com/ain1084/directring_buffer/issues/1)).

Impacto

The vulnerability's impact is primarily focused on system availability, with no direct impact on confidentiality or integrity. The local attack vector and low attack complexity suggest limited exposure, though the vulnerability requires no special privileges or user interaction to exploit (GitHub Advisory).

Mitigación y soluciones alternativas

The vulnerability has been fixed in version 0.2.2 of the directringbuffer crate. The fix involves using resizewith to properly initialize the buffer with T::default() and adding a T: Default bound to ensure sound initialization. Users should upgrade to version 0.2.2 or later to resolve this issue ([Pull Request](https://github.com/ain1084/directring_buffer/pull/2), RustSec Advisory).

Recursos adicionales


FuenteEste informe se generó utilizando IA

Relacionado Rust Vulnerabilidades:

CVE ID

Severidad

Puntuación

Tecnologías

Nombre del componente

Exploit de CISA KEV

Tiene arreglo

Fecha de publicación

GHSA-wwxp-hxh6-8gf8HIGH7.3
  • RustRust
  • binary_vec_io
NoNoOct 22, 2025
GHSA-x77x-7mmh-cxv3MEDIUM5.5
  • RustRust
  • ncurses
NoNoOct 22, 2025
GHSA-xcpm-76hf-c9ccLOW2
  • RustRust
  • borrowck_sacrifices
NoOct 22, 2025
GHSA-fp5x-7m4q-449fLOW2
  • RustRust
  • direct_ring_buffer
NoOct 21, 2025
GHSA-h5j3-crg5-8jqmLOW2
  • RustRust
  • orx-pinned-vec
NoOct 21, 2025

Evaluación gratuita de vulnerabilidades

Compare su postura de seguridad en la nube

Evalúe sus prácticas de seguridad en la nube en 9 dominios de seguridad para comparar su nivel de riesgo e identificar brechas en sus defensas.

Solicitar evaluación

Recursos adicionales de Wiz

Obtén una demostración personalizada

¿Listo para ver a Wiz en acción?

"La mejor experiencia de usuario que he visto en mi vida, proporciona una visibilidad completa de las cargas de trabajo en la nube."
David EstlickCISO
"Wiz proporciona un panel único para ver lo que ocurre en nuestros entornos en la nube."
Adam FletcherJefe de Seguridad
"Sabemos que si Wiz identifica algo como crítico, en realidad lo es."
Greg PoniatowskiJefe de Gestión de Amenazas y Vulnerabilidades