Vigilance.fr - ruzstd: out-of-bounds memory reading via uninit(), analyzed on 10/12/2024
An attacker can force a read at an invalid memory address of ruzstd, via uninit(), in order to trigger a denial of service, or to obtain sensitive information. - Security Vulnerability

An attacker can force a read at an invalid memory address of ruzstd, via uninit(), in order to trigger a denial of service, or to obtain sensitive information.