ruzstd is vulnerable to Out-of-bounds Read
80
High Risk
Affected versions of ruzstd miscalculate the length of the allocated and initialized section of its internal RingBuffer, leading to uninitialized or out-of-bounds reads in the copy_bytes_overshooting function. This vulnerability allows up to 15 bytes of uninitialized memory to be read and potentially written into the output when decompressing a specially crafted archive. If exploited, this issue may result in sensitive memory contents being included in the decompressed data. This leakage can occur multiple times during the processing of a single archive, increasing the potential exposure of confidential information.
You are affected if you are using a version that falls within the vulnerable range.
ruzstd is vulnerable to Out-of-bounds Read in versions 0.7.0 - 0.7.2.
Upgrade the ruzstd library to the patch version.
Secure your code, cloud, and runtime environments in one central system. Find and fix vulnerabilities automatically.
No credit card required | Scan results in 32secs.
SOC 2Compliant
ISO 27001Compliant