
Cloud Vulnerability DB
A community-led vulnerabilities database
The vulnerability (GHSA-jwh2-vrr9-vcp2) affects the mz-avro Rust crate, which was discovered to have an incorrect implementation of set_len that could lead to uninitialized memory exposure. The issue was reported on October 14, 2021, and was officially published to the GitHub Advisory Database on August 30, 2022. The vulnerability affects versions prior to 0.7.0 of the mz-avro package (GitHub Advisory, RustSec Advisory).
The vulnerability stems from the crate passing an uninitialized buffer to a user-provided Read implementation. This implementation can potentially read from the uninitialized buffer, leading to memory exposure. Additionally, it can return an incorrect number of bytes written to the buffer. The undefined behavior only occurs in specific cases where a user provides a struct whose Read implementation inspects the buffer passed to read_exact before writing to it, which is considered an unidiomatic Read implementation (GitHub Advisory).
The vulnerability can lead to memory exposure and undefined behavior in the program. Reading from uninitialized memory produces undefined values that can quickly invoke undefined behavior, potentially compromising the security and stability of applications using the affected versions of mz-avro (RustSec Advisory).
The vulnerability has been patched in version 0.7.0 of the mz-avro crate. Users are advised to upgrade to this version or later to mitigate the issue (RustSec Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."