-
CVSS Score
-| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| mz-avro | rust | < 0.7.0 | 0.7.0 |
The vulnerability stems from incorrect buffer initialization when interacting with user-provided Read implementations. The advisory specifically mentions misuse of set_len, which is an unsafe operation that can leave memory uninitialized. The primary affected component would be the reader implementation handling Avro data deserialization, where buffers are prepared for user-supplied readers. The combination of set_len usage followed by read_exact on an uninitialized buffer matches the described vulnerability pattern. While exact code isn't available, the described vulnerability mechanics strongly point to the read handling functions in the Avro reader implementation.