CVE-2021-28878
- EPSS 0.13%
- Published 11.04.2021 20:15:12
- Last modified 21.11.2024 06:00:21
In the standard library in Rust before 1.52.0, the Zip implementation calls __iterator_get_unchecked() more than once for the same index (under certain conditions) when next_back() and next() are used together. This bug could lead to a memory safety ...
CVE-2021-28879
- EPSS 0.12%
- Published 11.04.2021 20:15:12
- Last modified 21.11.2024 06:00:21
In the standard library in Rust before 1.52.0, the Zip implementation can report an incorrect size due to an integer overflow. This bug can lead to a buffer overflow when a consumed Zip iterator is used again.
CVE-2021-28877
- EPSS 0.22%
- Published 11.04.2021 20:15:12
- Last modified 21.11.2024 06:00:21
In the standard library in Rust before 1.51.0, the Zip implementation calls __iterator_get_unchecked() for the same index more than once when nested. This bug can lead to a memory safety violation due to an unmet safety requirement for the TrustedRan...
CVE-2021-28876
- EPSS 0.09%
- Published 11.04.2021 20:15:12
- Last modified 21.11.2024 06:00:21
In the standard library in Rust before 1.52.0, the Zip implementation has a panic safety issue. It calls __iterator_get_unchecked() more than once for the same index when the underlying iterator panics (in certain conditions). This bug could lead to ...
CVE-2021-28875
- EPSS 0.2%
- Published 11.04.2021 20:15:12
- Last modified 21.11.2024 06:00:21
In the standard library in Rust before 1.50.0, read_to_end() does not validate the return value from Read in an unsafe context. This bug could lead to a buffer overflow.
CVE-2020-36318
- EPSS 0.39%
- Published 11.04.2021 20:15:12
- Last modified 21.11.2024 05:29:15
In the standard library in Rust before 1.49.0, VecDeque::make_contiguous has a bug that pops the same element more than once under certain condition. This bug could result in a use-after-free or double free.
CVE-2020-36317
- EPSS 0.37%
- Published 11.04.2021 20:15:12
- Last modified 21.11.2024 05:29:15
In the standard library in Rust before 1.49.0, String::retain() function has a panic safety problem. It allows creation of a non-UTF-8 Rust string when the provided closure panics. This bug could result in a memory safety violation when other string ...
CVE-2015-20001
- EPSS 0.4%
- Published 11.04.2021 20:15:12
- Last modified 21.11.2024 02:26:32
In the standard library in Rust before 1.2.0, BinaryHeap is not panic-safe. The binary heap is left in an inconsistent state when the comparison of generic elements inside sift_up or sift_down_range panics. This bug leads to a drop of zeroed memory a...
CVE-2019-16760
- EPSS 0.18%
- Published 30.09.2019 22:15:10
- Last modified 21.11.2024 04:31:08
Cargo prior to Rust 1.26.0 may download the wrong dependency if your package.toml file uses the `package` configuration key. Usage of the `package` key to rename dependencies in `Cargo.toml` is ignored in Rust 1.25.0 and prior. When Rust 1.25.0 and p...
CVE-2019-1010299
- EPSS 0.3%
- Published 15.07.2019 18:15:11
- Last modified 21.11.2024 04:18:08
The Rust Programming Language Standard Library 1.18.0 and later is affected by: CWE-200: Information Exposure. The impact is: Contents of uninitialized memory could be printed to string or to log file. The component is: Debug trait implementation for...