
Cloud Vulnerability DB
A community-led vulnerabilities database
The vulnerability (GHSA-v363-rrf2-5fmj) affects the ferris-says Rust package, discovered and disclosed on January 17, 2024. The issue impacts versions >= 0.1.2 through 0.2.1 and >= 0.3.0 through < 0.3.1. The vulnerability stems from unsafe handling of UTF-8 input, where the package receives a &[u8] through a safe API but unsafely processes it using str::from_utf8_unchecked function (GitHub Advisory, RustSec Advisory).
The vulnerability arises from the package's unsafe handling of byte input. The affected versions directly pass &[u8] input to the unsafe str::from_utf8_unchecked function without proper validation, leading to undefined behavior when the input bytes are not valid UTF-8. This implementation creates a soundness issue in what should be a safe API (GitHub PR).
When exploited, this vulnerability results in undefined behavior if the input bytes provided to the ferris_says::say function are not valid UTF-8. This could potentially lead to memory safety violations or other unexpected behavior in applications using the affected versions of the package (RustSec Advisory).
The vulnerability has been fixed in version 0.3.1 of ferris-says. The fix involves replacing the unsafe str::from_utf8_unchecked with the safe str::from_utf8 function and implementing proper error handling for invalid inputs. Additionally, version 0.3 introduces a new API that accepts input as &str rather than &[u8], preventing this issue entirely (GitHub Advisory, RustSec Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."