
Cloud Vulnerability DB
A community-led vulnerabilities database
The vulnerability (GHSA-jf5h-cf95-w759) affects the raw-cpuid Rust package, discovered on January 17, 2021, and was published to the GitHub Advisory Database on June 17, 2022. The issue occurs when activating the non-default 'serialize' feature, where most structs implement serde::Deserialize without proper validation. This vulnerability affects versions 3.1.0 through 9.1.1 of the package, with version 9.1.1 containing the patch (GitHub Advisory, RustSec Advisory).
The vulnerability stems from insufficient validation in serde::Deserialize implementations when the 'serialize' feature is enabled. The technical issue specifically involves the unsafe use of std::str::fromutf8unchecked() internally in as_string() methods without proper validation of the input data. This creates a scenario where arbitrary content can be constructed in safe code, potentially leading to undefined behavior when invalid UTF-8 is processed (GitHub Issue).
The vulnerability can result in two primary impacts: undefined behavior in as_string() methods due to unsafe handling of potentially invalid UTF-8 data, and potential panics caused by failed assertions in the code (GitHub Advisory, RustSec Advisory).
The vulnerability has been patched in version 9.1.1 of the raw-cpuid package. Users should upgrade to this version or later to address the issue. For those unable to upgrade immediately, avoiding the use of the 'serialize' feature would prevent exposure to this vulnerability (GitHub Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."