SB2019071512 - Information disclosure in Rust Programming Language



SB2019071512 - Information disclosure in Rust Programming Language

Published: July 15, 2019 Updated: July 17, 2020

Security Bulletin ID SB2019071512
Severity
Medium
Patch available
YES
Number of vulnerabilities 1
Exploitation vector Remote access
Highest impact Information disclosure

Breakdown by Severity

Medium 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 1 security vulnerability.


1) Information disclosure (CVE-ID: CVE-2019-1010299)

The vulnerability allows a remote non-authenticated attacker to gain access to sensitive information.

The Rust Programming Language Standard Library 1.18.0 and later is affected by: CWE-200: Information Exposure. The impact is: Contents of uninitialized memory could be printed to string or to log file. The component is: Debug trait implementation for std::collections::vec_deque::Iter. The attack vector is: The program needs to invoke debug printing for iterator over an empty VecDeque. The fixed version is: 1.30.0, nightly versions after commit b85e4cc8fadaabd41da5b9645c08c68b8f89908d.


Remediation

Install update from vendor's website.