RUSTSEC-2023-0074

Source
https://rustsec.org/advisories/RUSTSEC-2023-0074
Import Source
https://github.com/rustsec/advisory-db/blob/osv/crates/RUSTSEC-2023-0074.json
JSON Data
https://api.osv.dev/v1/vulns/RUSTSEC-2023-0074
Aliases
Published
2023-12-14T12:00:00Z
Modified
2024-02-10T16:26:48.086990Z
Summary
Some Ref methods are unsound with some type parameters
Details

The Ref methods into_ref, into_mut, into_slice, and into_slice_mut are unsound and may allow safe code to exhibit undefined behavior when used with Ref<B, T> where B is cell::Ref or cell::RefMut. Note that these methods remain sound when used with B types other than cell::Ref or cell::RefMut.

See https://github.com/google/zerocopy/issues/716 for a more in-depth analysis.

The current plan is to yank the affected versions soon. See https://github.com/google/zerocopy/issues/679 for more detail.

Database specific
{
    "license": "CC0-1.0"
}
References

Affected packages

crates.io / zerocopy

Package

Affected ranges

Type
SEMVER
Events
Introduced
0.2.2
Fixed
0.2.9
Introduced
0.3.0
Fixed
0.3.2
Introduced
0.4.0
Fixed
0.4.1
Introduced
0.5.0
Fixed
0.5.2
Introduced
0.6.0
Fixed
0.6.6
Introduced
0.7.0
Fixed
0.7.31

Ecosystem specific

{
    "affected_functions": null,
    "affects": {
        "os": [],
        "functions": [
            "zerocopy::Ref::into_mut",
            "zerocopy::Ref::into_mut_slice",
            "zerocopy::Ref::into_ref",
            "zerocopy::Ref::into_slice"
        ],
        "arch": []
    }
}

Database specific

{
    "cvss": null,
    "informational": null,
    "categories": []
}