First published: Mon May 13 2019(Updated: )
The Rust Programming Language Standard Library 1.34.x before 1.34.2 contains a stabilized method which, if overridden, can violate Rust's safety guarantees and cause memory unsafety. If the `Error::type_id` method is overridden then any type can be safely cast to any other type, causing memory safety vulnerabilities in safe code (e.g., out-of-bounds write or read). Code that does not manually implement Error::type_id is unaffected.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Rust-lang Rust | >=1.34.0<1.34.2 | |
Fedoraproject Fedora | =29 | |
Fedoraproject Fedora | =30 | |
openSUSE Leap | =15.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-12083 is a vulnerability found in the Rust Programming Language Standard Library version 1.34.x before 1.34.2.
The severity of CVE-2019-12083 is high with a CVSS score of 8.1.
CVE-2019-12083 can violate Rust's safety guarantees and cause memory unsafety if the `Error::type_id` method in the Rust Programming Language Standard Library is overridden.
Rust Programming Language version 1.34.x before 1.34.2 is affected by CVE-2019-12083.
To fix CVE-2019-12083, update Rust Programming Language to version 1.34.2 or newer.