
Cloud Vulnerability DB
A community-led vulnerabilities database
A null pointer dereference vulnerability was discovered in the fast-float-rust library's AsciiStr struct, specifically in the first() method. The vulnerability was reported on October 13, 2024, and affects the library's memory safety when handling empty buffers (GitHub Issue).
The vulnerability exists in the first() method of the AsciiStr struct, where unsafe memory access is performed without proper bounds checking. When an empty buffer is provided, the code directly dereferences a pointer offset by self.ptr, which can lead to undefined behavior and potential segmentation faults. The issue was confirmed using Address Sanitizer (ASan) on Ubuntu 22.04.4 LTS with Rust compiler version 1.83.0-nightly (GitHub Issue).
When exploited, this vulnerability can lead to undefined behavior and potential program crashes through segmentation faults. The issue undermines Rust's core memory safety guarantees by allowing arbitrary memory access when an empty buffer is provided to the AsciiStr struct (GitHub Issue).
The vulnerability has been patched in fast-float2 version 0.2.2. The fix involves changing the first() method to return an Option type and implementing proper input validation to safely handle empty structs (GitHub Issue).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."