GHSA-gg76-hg3v-5q6c: macroquad vulnerable to multiple soundness issues
N/A
Basic Information
Technical Details
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| macroquad | rust | <= 0.4.14 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The identified vulnerable functions are based on the analysis of multiple GitHub issues (#333, #634, #723, #746) and the RustSec advisory RUSTSEC-2025-0035. No patched versions are available, so the analysis relies entirely on the descriptions of unsound behavior in these reports. The primary theme of the vulnerabilities is the unprincipled use of mutable static variables (primarily through macroquad::get_context), which leads to potential aliasing of mutable references and subsequent undefined behavior in functions like touch_event and Coroutine::poll. Other vulnerabilities stem from API designs that allow safe code to trigger undefined behavior, such as the public mutable fields of macroquad::texture::Image (leading to issues with Image::empty and Image::get_image_data) and the provision of references to uninitialized memory in macroquad::tweens::linear. The file paths are derived from the issue descriptions and standard Rust project structure conventions for the respective modules (e.g., macroquad::texture::Image implies src/texture.rs). Confidence is high for these functions as the issues provide specific code examples and explanations of the unsoundness.