CVE-2021-26307 – raw-cpuid
Package
Manager: cargo
Name: raw-cpuid
Vulnerable Version: >=0 <9.0.0
Severity
Level: Medium
CVSS v3.1: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
CVSS v4.0: CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
EPSS: 0.0005 pctl0.15284
Details
Error on unsupported architectures in raw-cpuid native_cpuid::cpuid_count() exposes the unsafe __cpuid_count() intrinsic from core::arch::x86 or core::arch::x86_64 as a safe function, and uses it internally, without checking the safety requirement: * The CPU the program is currently running on supports the function being called. CPUID is available in most, but not all, x86/x86_64 environments. The crate compiles only on these architectures, so others are unaffected. This issue is mitigated by the fact that affected programs are expected to crash deterministically every time. The flaw has been fixed in v9.0.0, by intentionally breaking compilation when targeting SGX or 32-bit x86 without SSE. This covers all affected CPUs.
Metadata
Created: 2021-08-25T20:53:07Z
Modified: 2023-06-13T20:29:54Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2021/08/GHSA-jrf8-cmgg-gv2m/GHSA-jrf8-cmgg-gv2m.json
CWE IDs: ["CWE-400", "CWE-657"]
Alternative ID: GHSA-jrf8-cmgg-gv2m
Finding: F067
Auto approve: 1