Rust - (bulletinoct2019)ID: oval:org.secpod.oval:def:2105130 | Date: (C)2019-12-31 (M)2021-07-08 |
Class: PATCH | Family: unix |
The Rust Programming Language Standard Library 1.18.0 and later is affected by: CWE-200: Information Exposure. The impact is: Contents of uninitialized memory could be printed to string or to log file. The component is: Debug trait implementation for std::collections::vec_deque::Iter. The attack vector is: The program needs to invoke debug printing for iterator over an empty VecDeque. The fixed version is: 1.30.0, nightly versions after commit b85e4cc8fadaabd41da5b9645c08c68b8f89908d.
Product: |
developer/rust/rustc |
developer/rust/cargo |
developer/rust/cargo-vendor |