RUSTSEC-2024-0426

Source
https://rustsec.org/advisories/RUSTSEC-2024-0426
Import Source
https://github.com/rustsec/advisory-db/blob/osv/crates/RUSTSEC-2024-0426.json
JSON Data
https://api.osv.dev/v1/vulns/RUSTSEC-2024-0426
Published
2024-12-19T12:00:00Z
Modified
2024-12-22T09:01:06Z
Summary
Unsound usages of `u8` type casting
Details

The library provides a safe public API unpack to cast u8 array to arbitrary types, which can cause to undefined behaviors. The length check of array can only prevent out-of-bound access on the return type. However, it can't prevent misaligned pointer when casting u8 pointer to a type aligned to larger bytes. For example, if we assign u16 to T, misaligned raw pointer dereference could happen and cause to panic. Even if we pass the type aligned to same byte as u8 (e.g., bool), it could construct a illegal type since bool can only have 0 or 1 as bit patterns, which is also an undefined behavior. The further exploits of the bug here are still not clear, so we would report this issue as unsound.

The details of PoC to reproduce undefined behavior are provided in the issue.

Database specific
{
    "license": "CC0-1.0"
}
References

Affected packages

crates.io / spl-token-swap

Package

Name
spl-token-swap
View open source insights on deps.dev
Purl
pkg:cargo/spl-token-swap

Affected ranges

Type
SEMVER
Events
Introduced
0.0.0-0

Ecosystem specific

{
    "affected_functions": null,
    "affects": {
        "os": [],
        "functions": [
            "spl_token_swap::instruction::unpack"
        ],
        "arch": []
    }
}

Database specific

{
    "cvss": null,
    "informational": "unsound",
    "categories": []
}