Vulnerability DatabaseGHSA-j3px-q95c-9683

GHSA-j3px-q95c-9683
Rust vulnerability analysis and mitigation

Overview

A denial of service vulnerability was discovered in zlib-rs (GHSA-j3px-q95c-9683), affecting versions 0.3.1 and below of the zlib-rs, libz-rs-sys, and libz-rs-sys-cdylib Rust packages. The vulnerability was discovered by security researcher @inahga through fuzzing and was published on November 14, 2024. The issue allows specially constructed input to trigger a stack overflow during decompression operations, resulting in process crashes (GitHub Advisory, RustSec).

Technical details

The vulnerability stems from LLVM's handling of the zlib-rs codebase, where tail calls were not guaranteed. This implementation issue causes certain input patterns to generate a large number of stack frames, leading to stack overflow conditions. The vulnerability has been assigned a CVSS score of 5.3 (Moderate), with base metrics indicating Network attack vector, Low attack complexity, No privileges required, No user interaction needed, Unchanged scope, and Low availability impact (GitHub Advisory).

Impact

When exploited, this vulnerability results in denial of service through process crashes. While these conditions are unlikely to occur in normal operations, malicious actors can deliberately craft input files to trigger the stack overflow. The impact is primarily on availability, with no direct effects on confidentiality or integrity (GitHub Advisory).

Mitigation and workarounds

The vulnerability has been patched in version 0.4.0 of all affected packages. Users are strongly advised to upgrade to this version. For those unable to upgrade immediately, alternative workarounds include running zlib-rs in a separate process to isolate potential crashes or implementing a signal handler to catch stack overflow events (GitHub Advisory).

Additional resources


SourceThis report was generated using AI

Related Rust vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-68705HIGH8.8
  • RustRust
  • rustfs
NoYesJan 07, 2026
CVE-2025-69255MEDIUM5.5
  • RustRust
  • rustfs
NoYesJan 07, 2026
GHSA-rhfx-m35p-ff5jLOW2.7
  • RustRust
  • lru
NoYesJan 07, 2026
GHSA-9c48-w39g-hm26LOW2.7
  • RustRust
  • rsa
NoYesJan 06, 2026
RUSTSEC-2026-0002N/AN/A
  • RustRust
  • lru
NoYesJan 07, 2026

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management