
Cloud Vulnerability DB
A community-led vulnerabilities database
RUSTSEC-2024-0400 affects the ruzstd crate version 0.7.x, which is a Rust implementation of the Zstd decompression algorithm. The vulnerability involves uninitialized and out-of-bounds memory reads during the decompression process (Debian Security).
The vulnerability occurs in the RingBuffer::extendfromwithin_unchecked function where memory operations can lead to undefined behavior due to uninitialized memory reads and potential out-of-bounds access. The issue specifically manifests when the tail of the ring buffer has wrapped around but the head hasn't, and when a data region being copied is either split or comes close to the end of the allocation (GitHub Issue).
When exploited, this vulnerability can lead to memory safety violations during the decompression of Zstd-compressed data, potentially causing program crashes or undefined behavior in applications using the affected versions of ruzstd (GitHub Issue).
The issue has been fixed in version 0.7.3-2. Users are advised to upgrade to this version or later. The fix involves proper handling of memory operations in the RingBuffer implementation and additional safety checks (Debian Security).
The vulnerability was responsibly disclosed and quickly addressed by the maintainers. The fix was merged and a new release was cut from the fixunsoundringbuffer branch. Additionally, the maintainers have added Miri testing to their CI pipeline to catch similar issues earlier in development (GitHub Issue).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."