logo

GHSA-3mv5-343c-w2qg zerocopy

Package

Manager: cargo
Name: zerocopy
Vulnerable Version: >=0.2.2 <0.2.9 || >=0.3.0 <0.3.2 || =0.4.0 || >=0.4.0 <0.4.1 || >=0.5.0 <0.5.2 || >=0.6.0 <0.6.6 || >=0.7.0 <0.7.31

Severity

Level: Low

CVSS v3.1: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C

CVSS v4.0: CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N

EPSS: N/A pctlN/A

Details

Ref methods into_ref, into_mut, into_slice, and into_slice_mut are unsound when used with cell::Ref or cell::RefMut *This advisory is also published as [RUSTSEC-2023-0074](https://rustsec.org/advisories/RUSTSEC-2023-0074.html).* The `Ref` methods `into_ref`, `into_mut`, `into_slice`, and `into_slice_mut` are unsound and may allow safe code to exhibit undefined behavior when used with `Ref<B, T>` where `B` is [`cell::Ref`](https://doc.rust-lang.org/core/cell/struct.Ref.html) or [`cell::RefMut`](https://doc.rust-lang.org/core/cell/struct.RefMut.html). Note that these methods remain sound when used with `B` types other than `cell::Ref` or `cell::RefMut`. See https://github.com/google/zerocopy/issues/716 for a more in-depth analysis. The current plan is to yank the affected versions soon. See https://github.com/google/zerocopy/issues/679 for more detail.

Metadata

Created: 2023-12-15T03:48:38Z
Modified: 2024-02-12T15:57:36Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/12/GHSA-3mv5-343c-w2qg/GHSA-3mv5-343c-w2qg.json
CWE IDs: []
Alternative ID: N/A
Finding: F113
Auto approve: 1