Buffer Overflow Affecting ordnung package, versions *


Severity

Recommended
0.0
high
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.12% (48th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-RUST-ORDNUNG-609764
  • published4 Sept 2020
  • disclosed3 Sept 2020
  • creditUnknown

Introduced: 3 Sep 2020

CVE-2020-35890  (opens in a new tab)
CVE-2020-35891  (opens in a new tab)
CWE-119  (opens in a new tab)

How to fix?

There is no fixed version for ordnung.

Overview

ordnung is a fast, vector-based map implementation that preserves insertion order.

Affected versions of this package are vulnerable to Buffer Overflow. compact::Vec contains multiple memory safety issues

  1. It mishandles large capacity and causes out-of-bound access in 32-bit / allocator layout mismatch in 64-bit.
  2. remove() is not panic-safe and causes double-free when an index larger than the length is provided.

References

CVSS Scores

version 3.1