
Cloud Vulnerability DB
A community-led vulnerabilities database
The vulnerability (GHSA-p56p-gq3f-whg8) affects the flumedb Rust crate, where uninitialized buffers are passed to user-provided Read implementations in the gooffsetlog::readentry() and offsetlog::read_entry() functions. The issue was discovered by the Rust group at Georgia Tech (sslab-gatech) and was reported on January 8, 2021. The vulnerability was patched in version 0.1.6 of the crate (GitHub Advisory, RustSec Advisory).
The vulnerability exists in two specific functions: gooffsetlog::readentry() and offsetlog::read_entry(). These functions create an uninitialized buffer and pass it to a user-provided Read implementation. This violates the safety requirements of the Read trait, which specifies that buffers must be initialized before calling read. The issue affects versions prior to 0.1.6 of the flumedb crate (Georgia Tech Issue).
The vulnerability can lead to memory exposure and undefined behavior in Rust programs. When exploited, arbitrary Read implementations can read from the uninitialized buffer, potentially exposing sensitive memory contents. Additionally, the implementation can return an incorrect number of bytes written to the buffer, leading to further undefined behavior (RustSec Advisory).
The issue has been fixed in version 0.1.6 of the flumedb crate by ensuring the buffer is zero-initialized before being passed to read_at(). The fix involves replacing the unsafe buffer initialization with a safe alternative using vec).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."