GHSA-67fv-9r7g-432h

Suggest an improvement
Source
https://github.com/advisories/GHSA-67fv-9r7g-432h
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/06/GHSA-67fv-9r7g-432h/GHSA-67fv-9r7g-432h.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-67fv-9r7g-432h
Aliases
  • CVE-2024-36760
Published
2024-06-13T18:31:59Z
Modified
2024-07-05T21:21:55Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
  • 8.7 (High) CVSS_V4 - CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N CVSS Calculator
Summary
Rhai stack overflow vulenrability
Details

A stack overflow vulnerability was found in version 1.18.0 of rhai. The flaw position is: (/ SRC/rhai/SRC/eval/STMT. Rs in rhai: : eval: : STMT: : _ $LT $impl $u20 $rhai.. engine.. Engine$GT$::evalstmt::h3f1d68ce37fc6e96). Due to the stack overflow is a recursive call/SRC/rhai/SRC/eval/STMT. Rs file evalstmt_block function.

References

Affected packages

crates.io / rhai

Package

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Last affected
1.18.0