diff options
| author | Tobias Kortkamp <tobik@FreeBSD.org> | 2019-05-15 03:08:32 +0000 |
|---|---|---|
| committer | Tobias Kortkamp <tobik@FreeBSD.org> | 2019-05-15 03:08:32 +0000 |
| commit | 5a6f5c2772f360ca6e57bc8c6264bd59232be3d2 (patch) | |
| tree | d98caf42b25952ffea31d931d5bb967f68fd769a | |
| parent | - Fix mistake in r501675, where OSVERSION was tested in a place where it (diff) | |
Add recent lang/rust security advisory
Notes
Notes:
svn path=/head/; revision=501678
| -rw-r--r-- | security/vuxml/vuln.xml | 36 |
1 files changed, 36 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index 5582078bede3..5fe71a8b90f4 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -58,6 +58,42 @@ Notes: * Do not forget port variants (linux-f10-libxml2, libxml2, etc.) --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="37528379-76a8-11e9-a4fd-00012e582166"> + <topic>Rust -- violation of Rust's safety guarantees</topic> + <affects> + <package> + <name>rust</name> + <range><ge>1.34.0</ge><lt>1.34.2</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>Sean McArthur reports:</p> + <blockquote cite="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12083"> + <p> + The Rust Programming Language Standard Library 1.34.x + before 1.34.2 contains a stabilized method which, if + overridden, can violate Rust's safety guarantees and + cause memory unsafety. If the Error::type_id method + is overridden then any type can be safely cast to any + other type, causing memory safety vulnerabilities in + safe code (e.g., out-of-bounds write or read). Code + that does not manually implement Error::type_id is + unaffected. + </p> + </blockquote> + </body> + </description> + <references> + <url>https://blog.rust-lang.org/2019/05/13/Security-advisory.html</url> + <cvename>CVE-2019-12083</cvename> + </references> + <dates> + <discovery>2019-05-09</discovery> + <entry>2019-05-15</entry> + </dates> + </vuln> + <vuln vid="a99923a9-768c-11e9-885a-6451062f0f7a"> <topic>Flash Player -- arbitrary code execution</topic> <affects> |
