Vulnerability DatabaseGHSA-hhw4-xg65-fp2x

GHSA-hhw4-xg65-fp2x
Rust vulnerability analysis and mitigation

Overview

The serdeyml crate, a Rust package, has been identified with a moderate severity vulnerability affecting versions up to 0.12. The vulnerability was discovered and disclosed on September 15, 2025, and involves unsoundness issues that can lead to segmentation faults. The GitHub project for serdeyml was subsequently archived after these issues were raised (GitHub Advisory, RustSec Advisory).

Technical details

The vulnerability is classified with a CVSS v4 score of 6.9 (Moderate severity), with local attack vector, low attack complexity, and no special privileges or user interaction required. The primary weakness is identified as CWE-787 (Out-of-bounds Write), where the product writes data past the end or before the beginning of the intended buffer. The issue specifically manifests when using serde_yml::ser::Serializer.emitter, which can trigger a segmentation fault (GitHub Advisory).

Impact

The vulnerability primarily affects system availability, with no direct impact on confidentiality or integrity. When exploited, it can cause the application to crash through segmentation faults, potentially disrupting service availability (GitHub Advisory).

Mitigation and workarounds

No direct patches are available as the crate is unmaintained. Users are strongly recommended to switch to maintained alternatives: serdenorway (a maintained fork using unsafe-libyaml-norway) or serdeyamlng (using unmaintained unsafe-libyaml). For those seeking pure Rust alternatives, serdeyaml2 and yaml-peg are available, though these implementations do not rely on C libyaml (RustSec Advisory).

Community reactions

The vulnerability was initially discovered through community reporting, as documented in issue #733 of the LACT project. The community response led to the archival of the GitHub project after the unsoundness issues were raised (RustSec Issue).

Additional resources


SourceThis report was generated using AI

Related Rust vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

GHSA-gfxp-f68g-8x78HIGH8.7
  • RustRust
  • libyml
NoNoSep 15, 2025
GHSA-95hm-pr6q-298wHIGH8.7
  • RustRust
  • fast-able
NoYesSep 15, 2025
GHSA-cvmj-47v9-35m9HIGH8.2
  • RustRust
  • fuser
NoYesSep 15, 2025
GHSA-hhw4-xg65-fp2xMEDIUM6.9
  • RustRust
  • serde_yml
NoNoSep 15, 2025
RUSTSEC-2025-0069N/AN/A
  • RustRust
  • daemonize
NoNoSep 14, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management