RUSTSEC-2023-0087

Source
https://rustsec.org/advisories/RUSTSEC-2023-0087
Import Source
https://github.com/rustsec/advisory-db/blob/osv/crates/RUSTSEC-2023-0087.json
JSON Data
https://api.osv.dev/v1/vulns/RUSTSEC-2023-0087
Aliases
Published
2023-10-14T12:00:00Z
Modified
2025-10-28T06:29:25.755823Z
Summary
`MaybeUninit` misuse in `simd-json-derive`
Details

An invalid use of MaybeUninit::uninit().assume_init() in simd-json-derive's derive macro can cause undefined behavior. The original code used MaybeUninit to avoid initialisation of the struct and then set the fields using ptr::write. The undefined behavior triggered by this misuse of MaybeUninit can lead to invlaid memory access and panics in binaries compiled in release mode (aka simd-json-derive prior to version 0.12 has UB and optimizes into some nonsense)

The 0.12.0 removes this section of code, avoiding the use of MaybeUninit alltogether.

Database specific
{
    "license": "CC0-1.0"
}
References

Affected packages

crates.io / simd-json-derive

Package

Name
simd-json-derive
View open source insights on deps.dev
Purl
pkg:cargo/simd-json-derive

Affected ranges

Type
SEMVER
Events
Introduced
0.0.0-0
Fixed
0.12.0

Ecosystem specific

{
    "affected_functions": null,
    "affects": {
        "os": [],
        "functions": [],
        "arch": []
    }
}

Database specific

informational

"unsound"

cvss

null

categories

[]