
Cloud Vulnerability DB
A community-led vulnerabilities database
The vulnerability (GHSA-fp5x-7m4q-449f) affects the direct_ring_buffer Rust crate versions prior to 0.2.2. The issue involves uninitialized memory exposure in the create_ring_buffer function, where the safe function allocates a buffer using Vec::with_capacity followed by set_len, creating a Box<[T]> containing uninitialized memory. The vulnerability was discovered and disclosed on October 21, 2025 (GitHub Advisory).
The vulnerability stems from the create_ring_buffer function's implementation, which allocates memory for the ring buffer without proper initialization. This violates Rust's safety rules when dealing with types that have validity invariants. The issue manifests when functions like write_slices and read_slices create typed slices (&mut [T] and &[T]) over uninitialized memory, leading to undefined behavior. The vulnerability is classified as CWE-908 (Use of Uninitialized Resource) and has been assigned a CVSS score of 2.0 (Low severity) (GitHub Advisory, Miggo).
When exploited, the vulnerability can lead to undefined behavior when functions attempt to create typed slices over uninitialized memory. This particularly affects operations involving typed slices (e.g., &mut [bool]) and can result in memory corruption or other unpredictable behavior (GitHub Issue).
The vulnerability has been fixed in version 0.2.2 of the direct_ring_buffer crate. The fix involves using resize_with to properly initialize the buffer with T::default(), adding a T: Default bound to ensure sound initialization. Users should upgrade to version 0.2.2 or later to address this security issue (RustSec).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."