Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: GSA_kwCzR0hTQS13NDI4LWY2NXItaDRxMs0fmw
Deserialization of Untrusted Data in rust-cpuid
An issue was discovered in the raw-cpuid crate before 9.1.1 for Rust. If the serialize feature is used (which is not the the default), a Deserialize operation may lack sufficient validation, leading to memory corruption or a panic.
Permalink: https://github.com/advisories/GHSA-w428-f65r-h4q2JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS13NDI4LWY2NXItaDRxMs0fmw
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Critical
Classification: General
Published: over 2 years ago
Updated: 11 months ago
CVSS Score: 9.8
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Identifiers: GHSA-w428-f65r-h4q2, CVE-2021-45687
References:
- https://nvd.nist.gov/vuln/detail/CVE-2021-45687
- https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/raw-cpuid/RUSTSEC-2021-0089.md
- https://rustsec.org/advisories/RUSTSEC-2021-0089.html
- https://github.com/gz/rust-cpuid/issues/43
- https://github.com/advisories/GHSA-w428-f65r-h4q2
Blast Radius: 33.5
Affected Packages
cargo:raw-cpuid
Dependent packages: 54Dependent repositories: 2,650
Downloads: 16,743,882 total
Affected Version Ranges: >= 3.1.0, < 9.1.1
Fixed in: 9.1.1
All affected versions: 3.1.0, 4.0.0, 5.0.0, 6.0.0, 6.1.0, 7.0.0, 7.0.1, 7.0.2, 7.0.3, 7.0.4, 8.0.0, 8.1.0, 8.1.1, 8.1.2, 9.0.0, 9.0.1, 9.1.0
All unaffected versions: 0.0.1, 0.0.2, 0.0.3, 0.0.4, 0.0.5, 0.1.0, 0.1.1, 0.2.0, 1.0.0, 1.0.1, 1.0.2, 1.0.3, 1.0.4, 2.0.0, 2.0.1, 2.0.2, 3.0.0, 9.1.1, 10.0.0, 10.1.0, 10.2.0, 10.3.0, 10.4.0, 10.5.0, 10.6.0, 10.6.1, 10.7.0, 11.0.0, 11.0.1, 11.0.2