Miggo Logo

GHSA-ghpq-vjxw-ch5w: Use after free in libpulse-binding

N/A

CVSS Score

Basic Information

CVE ID
-
EPSS Score
-
Published
8/25/2021
Updated
1/11/2023
KEV Status
No
Technology
TechnologyRust

Technical Details

CVSS Vector
-
Package NameEcosystemVulnerable VersionsFirst Patched Version
libpulse-bindingrust< 1.2.11.2.1

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The advisory explicitly names get_format_info and get_context methods as sources of UAF vulnerabilities. Both methods returned wrapper objects that failed to set critical ownership flags, causing premature destruction of underlying C objects they referenced. This matches the CWE-416 pattern where resource destruction isn't properly managed. The RustSec advisory directly lists these functions in its 'Affected Functions' section, confirming their involvement.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

### Ov*rvi*w V*rsion *.*.* o* t** `li*puls*-*in*in*` Rust *r*t*, r*l**s** on t** **t* o* Jun* ****, *ix** * p*ir o* us*-**t*r-*r** issu*s wit* t** o*j**ts r*turn** *y t** `**t_*orm*t_in*o` *n* `**t_*ont*xt` m*t*o*s o* `Str**m` o*j**ts. T**s* o*j**ts

Reasoning

T** **visory *xpli*itly n*m*s **t_*orm*t_in*o *n* **t_*ont*xt m*t*o*s *s sour**s o* U** vuln*r**iliti*s. *ot* m*t*o*s r*turn** wr*pp*r o*j**ts t**t **il** to s*t *riti**l own*rs*ip *l**s, **usin* pr*m*tur* **stru*tion o* un**rlyin* * o*j**ts t**y r**