-
CVSS Score
-| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| ash | rust | < 0.33.1 | 0.33.1 |
The vulnerability is explicitly named in the advisory title and described in multiple sources (GitHub Advisory, RustSec, and the original issue). The code analysis from the linked GitHub issue directly points to util::read_spv() in ash/src/util.rs lines 116-124, where an uninitialized buffer is passed to Read::read_exact. This matches the documented vulnerability pattern of passing uninitialized buffers to Read implementations, violating Rust's safety requirements for the Read trait.