redox_uefi_std is vulnerable to Heap-based Buffer Overflow
45
Medium Risk
Affected versions of this package contain a vulnerability in the ffi::nstr() function, which fails to validate whether the input buffer is properly null-terminated. Since this function is not marked as unsafe, it may be used incorrectly, leading to undefined behavior when processing unterminated buffers.
You are affected if you are using a version that falls within the vulnerable range.
redox_uefi_std is vulnerable to Heap-based Buffer Overflow in versions 0.1.8 - 0.1.13.
Upgrade the redox_uefi_std library to the patch version.
Secure your code, cloud, and runtime environments in one central system. Find and fix vulnerabilities automatically.
No credit card required | Scan results in 32secs.
SOC 2Compliant
ISO 27001Compliant