Vulnerability DatabaseGHSA-fp5x-7m4q-449f

GHSA-fp5x-7m4q-449f
Rust vulnerability analysis and mitigation

Overview

The Direct Ring Buffer library contains a vulnerability (GHSA-fp5x-7m4q-449f) discovered in October 2025, affecting versions prior to 0.2.2. The issue involves uninitialized memory exposure in the createringbuffer function, which was identified as a low severity vulnerability. The vulnerability affects the Rust package directringbuffer and was confirmed through Miri testing (GitHub Advisory, RustSec Advisory).

Technical details

The vulnerability stems from the createringbuffer function's implementation, which allocates a buffer using Vec::withcapacity followed by an unsafe setlen call, resulting in a Box<[T]> containing uninitialized memory. This implementation violates Rust's validity invariants when functions like writeslices attempt to create typed slices over the uninitialized memory. The vulnerability has been assigned a CVSS v4.0 score of 2.0 (Low) with the vector string CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P and is categorized under CWE-908 (Use of Uninitialized Resource) (GitHub Advisory, [Issue Report](https://github.com/ain1084/directring_buffer/issues/1)).

Impact

The vulnerability's impact is primarily focused on system availability, with no direct impact on confidentiality or integrity. The local attack vector and low attack complexity suggest limited exposure, though the vulnerability requires no special privileges or user interaction to exploit (GitHub Advisory).

Mitigation and workarounds

The vulnerability has been fixed in version 0.2.2 of the directringbuffer crate. The fix involves using resizewith to properly initialize the buffer with T::default() and adding a T: Default bound to ensure sound initialization. Users should upgrade to version 0.2.2 or later to resolve this issue ([Pull Request](https://github.com/ain1084/directring_buffer/pull/2), RustSec Advisory).

Additional resources


SourceThis report was generated using AI

Related Rust vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-62518HIGH8.1
  • RustRust
  • rust-astral-tokio-tar
NoYesOct 21, 2025
GHSA-fp5x-7m4q-449fLOW2
  • RustRust
  • direct_ring_buffer
NoYesOct 21, 2025
GHSA-h5j3-crg5-8jqmLOW2
  • RustRust
  • orx-pinned-vec
NoYesOct 21, 2025
RUSTSEC-2025-0107N/AN/A
  • RustRust
  • borrowck_sacrifices
NoYesOct 21, 2025
RUSTSEC-2025-0106N/AN/A
  • RustRust
  • orx-pinned-vec
NoYesOct 21, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management