
Cloud Vulnerability DB
A community-led vulnerabilities database
An issue was discovered in the nalgebra crate before version 0.27.1 for Rust, affecting the VecStorage component's deserialization implementation. The vulnerability was introduced in version 0.11.0 and was identified on June 6, 2021. This security flaw is tracked as CVE-2021-38190 (MITRE CVE, RustSec Advisory).
The vulnerability stems from the Deserialize implementation for VecStorage not maintaining a critical invariant where the number of elements must equal the product of row count and column count (nrows * ncols). The issue originated when an automatically derived implementation of Deserialize for MatrixVec was added in v0.11.0, which was later renamed to VecStorage in v0.16.13. The vulnerability has been assigned a CVSS v3.1 Base Score of 9.8 CRITICAL (Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) (NVD).
The vulnerability allows out-of-bounds memory access through deserialization of specially crafted inputs, potentially enabling access to memory beyond the vector's allocation. This could lead to memory corruption and memory exposure issues (RustSec Advisory).
The vulnerability was patched in nalgebra version 0.27.1 by implementing proper validation during deserialization to ensure the number of elements exactly matches the expected size. The fix was implemented in commit 5bff536, which returns an error during deserialization if the size invariant is violated (RustSec Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."