
Cloud Vulnerability DB
A community-led vulnerabilities database
RUSTSEC-2023-0075 is a vulnerability discovered in the unsafe-libyaml Rust crate that involves unsafe precondition violations. The issue specifically relates to pointer alignment and null pointer violations in the ptr::write operation (GitHub Issue).
The vulnerability manifests when using unsafe-libyaml with specific build configurations, particularly when compiling to WASM with threading support. The issue occurs in the yaml_parser_fetch_stream_start function where a ptr::write operation violates safety requirements regarding pointer alignment and null checks. The problem surfaces specifically when using build flags for atomics and bulk-memory features (GitHub Issue).
When triggered, the vulnerability causes runtime panics in applications using the affected library, particularly in WASM environments. This can lead to application crashes with an 'unreachable' runtime error, affecting the stability and functionality of applications using the unsafe-libyaml crate (GitHub Issue).
The vulnerability has been addressed in version 0.2.11-1 of the rust-unsafe-libyaml package (Debian Tracker). Users are advised to upgrade to this version or later to resolve the issue.
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."