{"id":"RUSTSEC-2026-0123","summary":"Out-of-bounds read in `bytes_helper` public safe functions","details":"The `bytes_helper` module contains multiple public functions\n(`into_arr4()`, `into_arr2()`, `u8_from_le_bytes()`) that use\n`slice.get_unchecked(pos..pos + N)` without verifying that\n`pos + N \u003c= slice.len()`. These are public safe API functions, allowing any\ncaller to trigger undefined behavior by passing invalid positions.\n\nFor example, calling `into_arr4(&data, 10)` where `data` is a 3-byte slice\ncauses an out-of-bounds access since position 10 exceeds the slice length.","modified":"2026-05-12T17:15:10.310502Z","published":"2026-05-02T12:00:00Z","database_specific":{"license":"CC0-1.0"},"references":[{"type":"PACKAGE","url":"https://crates.io/crates/rustdx"},{"type":"ADVISORY","url":"https://rustsec.org/advisories/RUSTSEC-2026-0123.html"},{"type":"REPORT","url":"https://github.com/zjp-CN/rustdx/issues/38"}],"affected":[{"package":{"name":"rustdx","ecosystem":"crates.io","purl":"pkg:cargo/rustdx"},"ranges":[{"type":"SEMVER","events":[{"introduced":"0.0.0-0"},{"fixed":"0.4.4"}]}],"ecosystem_specific":{"affects":{"os":[],"functions":[],"arch":[]},"affected_functions":null},"database_specific":{"source":"https://github.com/rustsec/advisory-db/blob/osv/crates/RUSTSEC-2026-0123.json","categories":["memory-corruption"],"cvss":null,"informational":"unsound"}}],"schema_version":"1.7.5"}