Skip to content

Conversation

@lewismosciski
Copy link
Contributor

The safe function fast_prefetch_range accepts raw pointer without validation, allowing undefined behavior through pointer wraparound.

Details

Safe function fast_prefetch_range accepts raw pointer without validation, allowing pointer wraparound causing undefined behavior.
@djc
Copy link
Contributor

djc commented Oct 21, 2025

@bindiego are you okay with this advisory being published?

@lewismosciski the RustSec project by policy typically requires maintainers to consent to advisories. If you're going to file lots of these, please bring along the maintainers where possible.

@lewismosciski
Copy link
Contributor Author

Hi @djc, thanks for the heads-up on the policy.

All advisories I filed are for issues that have already been confirmed and patched by the maintainers.

I'm signing off for the day, but I'll contact the maintainers for these pending advisories to get their consent here when I'm back.

One follow-up question: For future reference, what is the policy if a maintainer doesn't respond to a vulnerability report after a reasonable amount of time? Is publishing an advisory still possible then?

@djc
Copy link
Contributor

djc commented Oct 21, 2025

One follow-up question: For future reference, what is the policy if a maintainer doesn't respond to a vulnerability report after a reasonable amount of time? Is publishing an advisory still possible then?

See https://github.com/rustsec/advisory-db/blob/main/HOWTO_UNMAINTAINED.md.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants