First published: Tue May 06 2025(Updated: )
ffi::nstr() should be marked unsafe, since a pointer to a buffer without a trailing 0 value will cause a heap buffer overflow.
Affected Software | Affected Version | How to fix |
---|---|---|
rust/redox_uefi_std | >=0.1.8<0.1.14 | 0.1.14 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of GHSA-58xc-hpvq-8473 is classified as critical due to the potential for heap buffer overflow.
To fix GHSA-58xc-hpvq-8473, upgrade to redox_uefi_std version 0.1.14 or later.
GHSA-58xc-hpvq-8473 can lead to crashes or arbitrary code execution given a lack of a trailing zero in buffer pointers.
The vulnerability GHSA-58xc-hpvq-8473 affects the redox_uefi_std package versions between 0.1.8 and 0.1.14.
GHSA-58xc-hpvq-8473 is specific to the Rust programming environment utilizing the redox_uefi_std package.