Information Exposure Affecting rustc package, versions <1.30.0+dfsg1-1


Severity

Recommended
0.0
medium
0
10

Snyk's Security Team recommends NVD's CVSS assessment. Learn more

Threat Intelligence

EPSS
0.11% (47th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-DEBIANUNSTABLE-RUSTC-452792
  • published24 Jul 2019
  • disclosed15 Jul 2019

Introduced: 15 Jul 2019

CVE-2019-1010299  (opens in a new tab)
CWE-200  (opens in a new tab)
CWE-908  (opens in a new tab)

How to fix?

Upgrade Debian:unstable rustc to version 1.30.0+dfsg1-1 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream rustc package and not the rustc package as distributed by Debian. See How to fix? for Debian:unstable relevant fixed versions and status.

The Rust Programming Language Standard Library 1.18.0 and later is affected by: CWE-200: Information Exposure. The impact is: Contents of uninitialized memory could be printed to string or to log file. The component is: Debug trait implementation for std::collections::vec_deque::Iter. The attack vector is: The program needs to invoke debug printing for iterator over an empty VecDeque. The fixed version is: 1.30.0, nightly versions after commit b85e4cc8fadaabd41da5b9645c08c68b8f89908d.

CVSS Scores

version 3.1