Rust-lang

Rust

24 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.13%
  • Published 11.04.2021 20:15:12
  • Last modified 21.11.2024 06:00:21

In the standard library in Rust before 1.52.0, the Zip implementation calls __iterator_get_unchecked() more than once for the same index (under certain conditions) when next_back() and next() are used together. This bug could lead to a memory safety ...

Exploit
  • EPSS 0.12%
  • Published 11.04.2021 20:15:12
  • Last modified 21.11.2024 06:00:21

In the standard library in Rust before 1.52.0, the Zip implementation can report an incorrect size due to an integer overflow. This bug can lead to a buffer overflow when a consumed Zip iterator is used again.

  • EPSS 0.22%
  • Published 11.04.2021 20:15:12
  • Last modified 21.11.2024 06:00:21

In the standard library in Rust before 1.51.0, the Zip implementation calls __iterator_get_unchecked() for the same index more than once when nested. This bug can lead to a memory safety violation due to an unmet safety requirement for the TrustedRan...

Exploit
  • EPSS 0.09%
  • Published 11.04.2021 20:15:12
  • Last modified 21.11.2024 06:00:21

In the standard library in Rust before 1.52.0, the Zip implementation has a panic safety issue. It calls __iterator_get_unchecked() more than once for the same index when the underlying iterator panics (in certain conditions). This bug could lead to ...

Exploit
  • EPSS 0.2%
  • Published 11.04.2021 20:15:12
  • Last modified 21.11.2024 06:00:21

In the standard library in Rust before 1.50.0, read_to_end() does not validate the return value from Read in an unsafe context. This bug could lead to a buffer overflow.

Exploit
  • EPSS 0.39%
  • Published 11.04.2021 20:15:12
  • Last modified 21.11.2024 05:29:15

In the standard library in Rust before 1.49.0, VecDeque::make_contiguous has a bug that pops the same element more than once under certain condition. This bug could result in a use-after-free or double free.

Exploit
  • EPSS 0.37%
  • Published 11.04.2021 20:15:12
  • Last modified 21.11.2024 05:29:15

In the standard library in Rust before 1.49.0, String::retain() function has a panic safety problem. It allows creation of a non-UTF-8 Rust string when the provided closure panics. This bug could result in a memory safety violation when other string ...

Exploit
  • EPSS 0.4%
  • Published 11.04.2021 20:15:12
  • Last modified 21.11.2024 02:26:32

In the standard library in Rust before 1.2.0, BinaryHeap is not panic-safe. The binary heap is left in an inconsistent state when the comparison of generic elements inside sift_up or sift_down_range panics. This bug leads to a drop of zeroed memory a...

Exploit
  • EPSS 0.18%
  • Published 30.09.2019 22:15:10
  • Last modified 21.11.2024 04:31:08

Cargo prior to Rust 1.26.0 may download the wrong dependency if your package.toml file uses the `package` configuration key. Usage of the `package` key to rename dependencies in `Cargo.toml` is ignored in Rust 1.25.0 and prior. When Rust 1.25.0 and p...

Exploit
  • EPSS 0.3%
  • Published 15.07.2019 18:15:11
  • Last modified 21.11.2024 04:18:08

The Rust Programming Language Standard Library 1.18.0 and later is affected by: CWE-200: Information Exposure. The impact is: Contents of uninitialized memory could be printed to string or to log file. The component is: Debug trait implementation for...