MGASA-2018-0407

Source
https://advisories.mageia.org/MGASA-2018-0407.html
Import Source
https://advisories.mageia.org/MGASA-2018-0407.json
JSON Data
https://api.osv.dev/v1/vulns/MGASA-2018-0407
Upstream
Published
2018-10-19T18:00:37Z
Modified
2026-04-16T06:24:26.341663526Z
Summary
Updated rust packages fix security vulnerability
Details

Updated rust packages fix security vulnerability

The Rust Programming Language Standard Library before version 1.29.1 contains a CWE-680: Integer Overflow to Buffer Overflow vulnerability in the standard library that can result in buffer overflow. This attack appear to be exploitable via str::repeat, passed a large number, can overflow an internal buffer (CVE-2018-1000810).

References
Credits

Affected packages

Mageia:6 / rust

Package

Name
rust
Purl
pkg:rpm/mageia/rust?arch=source&distro=mageia-6

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.28.0-1.2.mga6

Ecosystem specific

{
    "section": "core"
}

Database specific

source
"https://advisories.mageia.org/MGASA-2018-0407.json"