Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2019-12083

Опубликовано: 13 мая 2019
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 6.8
CVSS3: 8.1

Описание

The Rust Programming Language Standard Library 1.34.x before 1.34.2 contains a stabilized method which, if overridden, can violate Rust's safety guarantees and cause memory unsafety. If the Error::type_id method is overridden then any type can be safely cast to any other type, causing memory safety vulnerabilities in safe code (e.g., out-of-bounds write or read). Code that does not manually implement Error::type_id is unaffected.

РелизСтатусПримечание
bionic

not-affected

only affected nightly in this version
cosmic

not-affected

only affected nightly in this version
devel

not-affected

only affected nightly in this version
disco

not-affected

only affected nightly in this version
esm-apps/bionic

not-affected

only affected nightly in this version
esm-apps/xenial

not-affected

only affected nightly in this version
esm-infra-legacy/trusty

not-affected

only affected nightly in this version
precise/esm

DNE

trusty

ignored

end of standard support
trusty/esm

not-affected

only affected nightly in this version

Показывать по

EPSS

Процентиль: 73%
0.00784
Низкий

6.8 Medium

CVSS2

8.1 High

CVSS3

Связанные уязвимости

CVSS3: 8.1
nvd
больше 6 лет назад

The Rust Programming Language Standard Library 1.34.x before 1.34.2 contains a stabilized method which, if overridden, can violate Rust's safety guarantees and cause memory unsafety. If the `Error::type_id` method is overridden then any type can be safely cast to any other type, causing memory safety vulnerabilities in safe code (e.g., out-of-bounds write or read). Code that does not manually implement Error::type_id is unaffected.

CVSS3: 8.1
debian
больше 6 лет назад

The Rust Programming Language Standard Library 1.34.x before 1.34.2 co ...

CVSS3: 8.1
github
больше 3 лет назад

The Rust Programming Language Standard Library 1.34.x before 1.34.2 contains a stabilized method which, if overridden, can violate Rust's safety guarantees and cause memory unsafety. If the `Error::type_id` method is overridden then any type can be safely cast to any other type, causing memory safety vulnerabilities in safe code (e.g., out-of-bounds write or read). Code that does not manually implement Error::type_id is unaffected.

CVSS3: 5.6
fstec
больше 6 лет назад

Уязвимость метода «Error::type_id» языка программирования Rust, позволяющая нарушителю выполнить произвольный код

suse-cvrf
больше 6 лет назад

Security update for rust

EPSS

Процентиль: 73%
0.00784
Низкий

6.8 Medium

CVSS2

8.1 High

CVSS3