-
CVSS Score
-Basic Information
CVE ID
-
GHSA ID
-
EPSS Score
-
CWE
-
Published
-
Updated
-
KEV Status
-
Technology
-
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| flumedb | rust | < 0.1.6 | 0.1.6 |
The vulnerability report explicitly identifies these two functions as problematic. Both follow the same unsafe pattern: 1) Create buffer with uninitialized memory using Vec::with_capacity() + unsafe set_len(), 2) Pass this buffer to a user-controlled Read implementation. The commit diff shows these were fixed by replacing with vec![0; size] which initializes memory, confirming the vulnerability pattern. The functions match the description in both the advisory and GitHub issue, with code examples showing direct use of uninitialized buffers.
KEV Misses 88% of Exploited CVEs- Get the report