HistoryEditJSON (OSV)

RUSTSEC-2026-0038

RustSec Advisory

Reported
Issued
Package
rssn (crates.io)
Type
Vulnerability
Categories
Keywords
#jit #ace
Aliases
References
CVSS Score
9.4 CRITICAL
CVSS Details
Attack Complexity
Low
Attack Requirements
None
Attack Vector
Local
Privileges Required
None
Availability Impact to the Subsequent System
High
Confidentiality Impact to the Subsequent System
High
Integrity Impact to the Subsequent System
High
User Interaction
None
Availability Impact to the Vulnerable System
High
Confidentiality Impact to the Vulnerable System
High
Integrity Impact to the Vulnerable System
High
CVSS Vector
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
Patched
  • >=0.2.9
Unaffected
  • <0.1.20

Description

Impact

Vulnerability Type: Improper Control of Generation of Code ('Code Injection') (CWE-94) / Improper Check for Unusual or Exceptional Conditions (CWE-754) / Improper Input Validation (CWE-20) / Use of Low-Level Functionality (CWE-695) / Improper Privilege Management (CWE-269) / External Control of System or Configuration Setting (CWE-15).

Technical Details: The vulnerability exists in the JIT (Just-In-Time) compilation engine, which is fully exposed via the CFFI (Foreign Function Interface). Due to Improper Input Validation and External Control of Code Generation, an attacker can supply malicious parameters or instruction sequences through the CFFI layer. Since the library often operates with elevated privileges or within high-performance computing contexts, this allows for Arbitrary Code Execution (ACE) at the privilege level of the host process.

Who is Impacted?

Workarounds

If you cannot upgrade immediately, please consider the following mitigations:

References

Apich Organization Security Team Homepage

Advisory available under CC-BY-4.0 license. Source: https://github.com/Apich-Organization/rssn/security/advisories/GHSA-9c4h-pwmf-m6fj