-
CVSS Score
-The vulnerability stems from two key points: 1) The constructor (from()) doesn't validate buffer size against the fixed_size * length requirement, allowing invalid array creation. 2) The value() method then uses these invalid dimensions to calculate offsets without bounds checks. The provided stack trace shows the UB occurs in value() at array_binary.rs line 347, and the reproduction code demonstrates the vulnerable constructor usage. Both functions are directly implicated in the insufficient validation chain.
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| arrow | rust | < 6.4.0 | 6.4.0 |
A Semantic Attack on Google Gemini - Read the Latest Research