Ecosyste.ms: Advisories

An open API service providing security vulnerability metadata for many open source software ecosystems.

Security Advisories: MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLWpyZjgtY21nZy1ndjJt

Error on unsupported architectures in raw-cpuid

native_cpuid::cpuid_count() exposes the unsafe __cpuid_count() intrinsic from core::arch::x86 or core::arch::x86_64 as a safe function, and uses it internally, without checking the safety requirement:

CPUID is available in most, but not all, x86/x86_64 environments. The crate compiles only on these architectures, so others are unaffected. This issue is mitigated by the fact that affected programs are expected to crash deterministically every time.

The flaw has been fixed in v9.0.0, by intentionally breaking compilation when targeting SGX or 32-bit x86 without SSE. This covers all affected CPUs.

Permalink: https://github.com/advisories/GHSA-jrf8-cmgg-gv2m
JSON: https://advisories.ecosyste.ms/api/v1/advisories/MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLWpyZjgtY21nZy1ndjJt
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Moderate
Classification: General
Published: over 2 years ago
Updated: 11 months ago


CVSS Score: 5.5
CVSS vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

Identifiers: GHSA-jrf8-cmgg-gv2m, CVE-2021-26307
References: Repository: https://github.com/gz/rust-cpuid
Blast Radius: 18.8

Affected Packages

cargo:raw-cpuid
Dependent packages: 54
Dependent repositories: 2,650
Downloads: 16,664,120 total
Affected Version Ranges: < 9.0.0
Fixed in: 9.0.0
All affected versions: 0.0.1, 0.0.2, 0.0.3, 0.0.4, 0.0.5, 0.1.0, 0.1.1, 0.2.0, 1.0.0, 1.0.1, 1.0.2, 1.0.3, 1.0.4, 2.0.0, 2.0.1, 2.0.2, 3.0.0, 3.1.0, 4.0.0, 5.0.0, 6.0.0, 6.1.0, 7.0.0, 7.0.1, 7.0.2, 7.0.3, 7.0.4, 8.0.0, 8.1.0, 8.1.1, 8.1.2
All unaffected versions: 9.0.0, 9.0.1, 9.1.0, 9.1.1, 10.0.0, 10.1.0, 10.2.0, 10.3.0, 10.4.0, 10.5.0, 10.6.0, 10.6.1, 10.7.0, 11.0.0, 11.0.1