Information Exposure The advisory has been revoked - it doesn't affect any version of package rust-analysis  (opens in a new tab)


Threat Intelligence

EPSS
0.11% (47th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-RHEL8-RUSTANALYSIS-1812543
  • published1 Nov 2021
  • disclosed21 Aug 2018

Introduced: 21 Aug 2018

CVE-2019-1010299  (opens in a new tab)
CWE-200  (opens in a new tab)

Amendment

The Red Hat security team deemed this advisory irrelevant for RHEL:8.

NVD Description

Note: Versions mentioned in the description apply only to the upstream rust-analysis package and not the rust-analysis package as distributed by RHEL.

The Rust Programming Language Standard Library 1.18.0 and later is affected by: CWE-200: Information Exposure. The impact is: Contents of uninitialized memory could be printed to string or to log file. The component is: Debug trait implementation for std::collections::vec_deque::Iter. The attack vector is: The program needs to invoke debug printing for iterator over an empty VecDeque. The fixed version is: 1.30.0, nightly versions after commit b85e4cc8fadaabd41da5b9645c08c68b8f89908d.