Vulnerability DatabaseGHSA-2326-pfpj-vx3h

GHSA-2326-pfpj-vx3h
Rust vulnerability analysis and mitigation

Overview

The lexical-core library (versions < 1.0.0) contains multiple critical soundness issues affecting its core functionality. The vulnerability was discovered and reported in September 2023, impacting the Rust programming language ecosystem. The issues affect various components of the library, including memory handling, iterator operations, and trait safety (GitHub Advisory, RustSec Advisory).

Technical details

The vulnerability encompasses multiple distinct soundness issues: 1) Bytes::read() incorrectly allows creation of types with invalid bit patterns, 2) BytesIter::read() contains a flaw that advances iterators out of bounds, 3) The BytesIter trait exposes safety invariants while being public and not marked as unsafe, 4) write_float() and radix() functions improperly call MaybeUninit::assume_init() on uninitialized data, which violates Rust's abstract machine rules (GitHub Advisory, RustSec Advisory).

Impact

The vulnerabilities could lead to undefined behavior in Rust programs using the affected versions of lexical-core. The issues primarily affect memory safety and type system guarantees, which are fundamental to Rust's safety promises. These soundness issues could potentially result in memory corruption or other undefined behavior in applications using the library (GitHub Advisory).

Mitigation and workarounds

The issues have been fixed in version 1.0.0 of lexical-core, which removes the vast majority of unsafe code and addresses all identified soundness issues. Users are strongly advised to upgrade to version 1.0.0 or later. For those unable to upgrade immediately, alternative crates are recommended: for floating-point parsing, the fast float parsing algorithm has been merged into libcore; for integer parsing, consider using atoi and btoi crates which are 100% safe (GitHub Advisory).

Additional resources


SourceThis report was generated using AI

Related Rust vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2026-22698HIGH8.7
  • RustRust
  • sm2
NoNoJan 10, 2026
CVE-2026-22700HIGH7.5
  • RustRust
  • sm2
NoNoJan 10, 2026
CVE-2026-22699HIGH7.5
  • RustRust
  • sm2
NoNoJan 10, 2026
CVE-2026-22705MEDIUM6.4
  • RustRust
  • ml-dsa
NoYesJan 10, 2026
CVE-2025-15504MEDIUM4.8
  • PythonPython
  • lief
NoYesJan 10, 2026

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management