rustsec-2021-0045
Vulnerability from osv_rustsec
Published
2021-01-11 12:00
Modified
2023-06-13 13:10
Summary
FromIterator implementation for Vector/Matrix can drop uninitialized memory
Details
The FromIterator<T> methods for Vector and Matrix rely on the type
parameter N to allocate space in the iterable.
If the passed in N type parameter is larger than the number of items returned
by the iterator, it can lead to uninitialized memory being left in the
Vector or Matrix type which gets dropped.
Severity
9.8 (Critical)
References
| URL | Type | |
|---|---|---|
{
"affected": [
{
"database_specific": {
"categories": [
"memory-corruption"
],
"cvss": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"informational": null
},
"ecosystem_specific": {
"affected_functions": null,
"affects": {
"arch": [],
"functions": [],
"os": []
}
},
"package": {
"ecosystem": "crates.io",
"name": "adtensor",
"purl": "pkg:cargo/adtensor"
},
"ranges": [
{
"events": [
{
"introduced": "0.0.0-0"
}
],
"type": "SEMVER"
}
],
"versions": []
}
],
"aliases": [
"CVE-2021-29936",
"GHSA-rg4m-gww5-7p47"
],
"database_specific": {
"license": "CC0-1.0"
},
"details": "The `FromIterator\u003cT\u003e` methods for `Vector` and `Matrix` rely on the type\nparameter `N` to allocate space in the iterable.\n\nIf the passed in `N` type parameter is larger than the number of items returned\nby the iterator, it can lead to uninitialized memory being left in the\n`Vector` or `Matrix` type which gets dropped.",
"id": "RUSTSEC-2021-0045",
"modified": "2023-06-13T13:10:24Z",
"published": "2021-01-11T12:00:00Z",
"references": [
{
"type": "PACKAGE",
"url": "https://crates.io/crates/adtensor"
},
{
"type": "ADVISORY",
"url": "https://rustsec.org/advisories/RUSTSEC-2021-0045.html"
},
{
"type": "REPORT",
"url": "https://github.com/charles-r-earp/adtensor/issues/4"
}
],
"related": [],
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
],
"summary": "FromIterator implementation for Vector/Matrix can drop uninitialized memory"
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…