Home

Description

rssn is a scientific computing library for Rust, combining a high-performance symbolic computation engine with numerical methods support and physics simulations functionalities. The vulnerability exists in the JIT (Just-In-Time) compilation engine, which is fully exposed via the CFFI (Foreign Function Interface). Due to Improper Input Validation and External Control of Code Generation, an attacker can supply malicious parameters or instruction sequences through the CFFI layer. Since the library often operates with elevated privileges or within high-performance computing contexts, this allows for Arbitrary Code Execution (ACE) at the privilege level of the host process.

PUBLISHED Reserved 2026-03-07 | Published 2026-03-10 | Updated 2026-03-10 | Assigner GitHub_M




CRITICAL: 9.4CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H

Problem types

CWE-94: Improper Control of Generation of Code ('Code Injection')

CWE-269: Improper Privilege Management

CWE-695: Use of Low-Level Functionality

CWE-754: Improper Check for Unusual or Exceptional Conditions

Product status

< 0.2.9
affected

References

github.com/...n/rssn/security/advisories/GHSA-9c4h-pwmf-m6fj

github.com/Apich-Organization/rssn/releases/tag/v0.2.9

rustsec.org/advisories/RUSTSEC-2026-0038.html

cve.org (CVE-2026-30960)

nvd.nist.gov (CVE-2026-30960)

Download JSON