Heap-based Buffer Overflow Affecting toodee package, versions >=0.2.0 <0.6.0


Severity

Recommended
0.0
high
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

Exploit Maturity
Proof of Concept

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-RUST-TOODEE-12670801
  • published15 Sept 2025
  • disclosed8 Sept 2025
  • creditGeorge Androutsopoulos

Introduced: 8 Sep 2025

CVE NOT AVAILABLE CWE-122  (opens in a new tab)

How to fix?

Upgrade toodee to version 0.6.0 or higher.

Overview

toodee is an a lightweight and high performance two-dimensional wrapper around a growable Vec.

Affected versions of this package are vulnerable to Heap-based Buffer Overflow via the DrainCol::drop destructor. An attacker can cause memory corruption or potentially execute arbitrary code by triggering an off-by-one error during the destruction of a column, leading to a memory copy operation that exceeds the bounds of the associated vector.

PoC

use toodee::*;
fn main() {
    let mut array = TooDee::init(2, 2, 0);
    array.remove_col(0);
}

CVSS Base Scores

version 4.0
version 3.1