Skip to content

Commit 5ac8bcd

Browse files
Merge pull request #850 from AikidoSec/new-vuln-uninitalized-resource-fuser
New vuln: Use of Uninitialized Resource in fuser
2 parents 34b3ce1 + 0a6f0cf commit 5ac8bcd

File tree

1 file changed

+26
-0
lines changed

1 file changed

+26
-0
lines changed
Lines changed: 26 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,26 @@
1+
{
2+
"package_name": "fuser",
3+
"patch_versions": [
4+
"0.16.0"
5+
],
6+
"vulnerable_ranges": [
7+
[
8+
"0.5.0",
9+
"0.15.1"
10+
]
11+
],
12+
"cwe": [
13+
"CWE-908"
14+
],
15+
"tldr": "Affected versions of this package are vulnerable to uninitialized memory read and leak in the fuser crate, specifically when creating a new libfuse session with `fuser::Session::new`, where the operation list is incorrectly passed as NULL instead of a valid pointer, causing libfuse to read and leak uninitialized memory. An attacker could exploit this by inducing the application to initialize a FUSE session, potentially disclosing sensitive data from heap memory, such as passwords or cryptographic keys, which might facilitate information disclosure or, in combination with other vulnerabilities, lead to code execution.",
16+
"doest_this_affect_me": "You are affected if you are using a version that falls within the vulnerable range and if you are using the affected function `fuser::Session::new` when creating a new libfuse session.",
17+
"how_to_fix": "Upgrade the `fuser` library to the patch version.",
18+
"vulnerable_to": "Use of Uninitialized Resource",
19+
"related_cve_id": "",
20+
"language": "Rust",
21+
"severity_class": "MEDIUM",
22+
"aikido_score": 41,
23+
"changelog": "https://rustsec.org/advisories/RUSTSEC-2021-0154",
24+
"last_modified": "2025-10-02",
25+
"published": "2025-10-02"
26+
}

0 commit comments

Comments
 (0)