The Rust Programming Language Standard Library version 1.29.0, 1.28.0, 1.27.2, 1.27.1, 127.0, 126.2, 126.1, 126.0 contains a CWE-680: Integer Overflow to Buffer Overflow vulnerability in standard library that can result in buffer overflow. This attack appear to be exploitable via str::repeat, passed a large number, can overflow an internal buffer. This vulnerability appears to have been fixed in 1.29.1.
2018-10-08T15:29:01.227
2024-11-21T03:40:24.250
Modified
CVSSv3.0: 9.8 (CRITICAL)
AV:N/AC:L/Au:N/C:P/I:P/A:P
10.0
6.4
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Application | rust-lang | rust | 1.26.0 | Yes |
Application | rust-lang | rust | 1.26.1 | Yes |
Application | rust-lang | rust | 1.26.2 | Yes |
Application | rust-lang | rust | 1.27.0 | Yes |
Application | rust-lang | rust | 1.27.1 | Yes |
Application | rust-lang | rust | 1.27.2 | Yes |
Application | rust-lang | rust | 1.28.0 | Yes |
Application | rust-lang | rust | 1.29.0 | Yes |