
Cloud Vulnerability DB
A community-led vulnerabilities database
A critical vulnerability was discovered in the rust-openssl library's MemBio::getbuf function, identified as RUSTSEC-2024-0357. The vulnerability involves undefined behavior when handling empty buffers, where the function incorrectly calls slice::fromraw_parts with a null pointer, violating the function's invariants (GitHub PR).
The vulnerability stems from a violation of Rust's safety requirements where MemBio::getbuf would call slice::fromrawparts with a null pointer when handling empty buffers. This violates the fundamental requirement that pointer arguments to slice::fromraw_parts must be non-null, even for empty slices. In debug builds, this would manifest as an assertion failure (GitHub PR).
The vulnerability could lead to undefined behavior in applications using the affected versions of rust-openssl when handling empty buffers. This is particularly concerning for applications processing SSL/TLS communications where empty buffers might be encountered (GitHub PR).
The vulnerability has been fixed in rust-openssl version 0.10.66. Users are advised to upgrade their rust-openssl dependency to version 0.10.66 or later using the command 'cargo update -p openssl' (GitHub PR).
The vulnerability has prompted numerous dependency update pull requests across various Rust projects, including matrix-rust-sdk, artemis, and others, indicating widespread awareness and response from the Rust community (GitHub PR).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."