
Cloud Vulnerability DB
A community-led vulnerabilities database
The vulnerability (GHSA-f7qj-v3vp-4856) affects the LibAFL Rust library, specifically involving unsound usage of core::slice::from_raw_parts_mut. The issue was discovered and reported in September 2023, affecting versions prior to 0.11.2. The vulnerability stems from breaking safety assumptions in memory handling operations (GitHub Advisory, RustSec Advisory).
The vulnerability occurs when the library incorrectly handles pointer alignment by directly casting a u8 raw pointer to a u16 pointer and passing it to core::slice::from_raw_parts_mut. This operation violates memory alignment requirements, leading to undefined behavior. The issue specifically affects the libafl::observers::map::HitcountsMapObserver::post_exec function in versions prior to 0.11.2. The CVSS v4 score for this vulnerability is 6.9 (Moderate severity) (GitHub Advisory).
The vulnerability results in undefined behavior due to misaligned memory access, which could potentially lead to memory corruption or system instability. The integrity impact is rated as Low according to the CVSS metrics, while there are no direct impacts on confidentiality or availability (GitHub Advisory).
The vulnerability has been patched in version 0.11.2 of LibAFL. The fix involves using align_offset to ensure proper 2-byte alignment for u16 pointers. Users are advised to upgrade to version 0.11.2 or later (GitHub Issue, GitHub PR).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."