GHSA-PFP7-VXGR-83PW
Vulnerability from github – Published: 2025-09-09 15:23 – Updated: 2025-09-09 15:23
VLAI?
Summary
toodee is vulnerable to Heap Buffer Overflow through its DrainCol Destructor
Details
An off-by-one error in the DrainCol::drop destructor could cause an unsafe memory copy operation to exceed the bounds of the associated vector.
The error was related to the size of the data being copied in one of the ptr::copy invocations inside the destructor.
When removing the first column from a TooDee object, the DrainCol return object could cause a heap buffer overflow vulnerability when it is dropped.
The issue was fixed in commit e6e16d5 by reducing the copied size by one.
Severity ?
{
"affected": [
{
"package": {
"ecosystem": "crates.io",
"name": "toodee"
},
"ranges": [
{
"events": [
{
"introduced": "0.2.0"
},
{
"fixed": "0.6.0"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"aliases": [],
"database_specific": {
"cwe_ids": [
"CWE-122"
],
"github_reviewed": true,
"github_reviewed_at": "2025-09-09T15:23:43Z",
"nvd_published_at": null,
"severity": "HIGH"
},
"details": "An off-by-one error in the `DrainCol::drop` destructor could cause an unsafe memory copy operation to exceed the bounds of the associated vector.\n\nThe error was related to the size of the data being copied in one of the `ptr::copy` invocations inside the destructor.\n\nWhen removing the first column from a TooDee object, the DrainCol return object could cause a heap buffer overflow vulnerability when it is dropped.\n\nThe issue was fixed in commit `e6e16d5` by reducing the copied size by one.",
"id": "GHSA-pfp7-vxgr-83pw",
"modified": "2025-09-09T15:23:43Z",
"published": "2025-09-09T15:23:43Z",
"references": [
{
"type": "WEB",
"url": "https://github.com/antonmarsden/toodee/issues/26"
},
{
"type": "WEB",
"url": "https://github.com/antonmarsden/toodee/commit/e6e16d5a97e6258ffbedbae1bde65b45c60f242f"
},
{
"type": "PACKAGE",
"url": "https://github.com/antonmarsden/toodee"
},
{
"type": "WEB",
"url": "https://rustsec.org/advisories/RUSTSEC-2025-0062.html"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:H/SC:L/SI:L/SA:L",
"type": "CVSS_V4"
}
],
"summary": "toodee is vulnerable to Heap Buffer Overflow through its DrainCol Destructor"
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…