ID CVE-2020-26235
Summary In Rust time crate from version 0.2.7 and before version 0.2.23, unix-like operating systems may segfault due to dereferencing a dangling pointer in specific circumstances. This requires the user to set any environment variable in a different thread than the affected functions. The affected functions are time::UtcOffset::local_offset_at, time::UtcOffset::try_local_offset_at, time::UtcOffset::current_local_offset, time::UtcOffset::try_current_local_offset, time::OffsetDateTime::now_local and time::OffsetDateTime::try_now_local. Non-Unix targets are unaffected. This includes Windows and wasm. The issue was introduced in version 0.2.7 and fixed in version 0.2.23.
References
Vulnerable Configurations
  • cpe:2.3:a:time_project:time:0.2.7:*:*:*:*:rust:*:*
    cpe:2.3:a:time_project:time:0.2.7:*:*:*:*:rust:*:*
  • cpe:2.3:a:time_project:time:0.2.8:*:*:*:*:rust:*:*
    cpe:2.3:a:time_project:time:0.2.8:*:*:*:*:rust:*:*
  • cpe:2.3:a:time_project:time:0.2.9:*:*:*:*:rust:*:*
    cpe:2.3:a:time_project:time:0.2.9:*:*:*:*:rust:*:*
  • cpe:2.3:a:time_project:time:0.2.10:*:*:*:*:rust:*:*
    cpe:2.3:a:time_project:time:0.2.10:*:*:*:*:rust:*:*
  • cpe:2.3:a:time_project:time:0.2.11:*:*:*:*:rust:*:*
    cpe:2.3:a:time_project:time:0.2.11:*:*:*:*:rust:*:*
  • cpe:2.3:a:time_project:time:0.2.12:*:*:*:*:rust:*:*
    cpe:2.3:a:time_project:time:0.2.12:*:*:*:*:rust:*:*
  • cpe:2.3:a:time_project:time:0.2.13:*:*:*:*:rust:*:*
    cpe:2.3:a:time_project:time:0.2.13:*:*:*:*:rust:*:*
  • cpe:2.3:a:time_project:time:0.2.14:*:*:*:*:rust:*:*
    cpe:2.3:a:time_project:time:0.2.14:*:*:*:*:rust:*:*
  • cpe:2.3:a:time_project:time:0.2.15:*:*:*:*:rust:*:*
    cpe:2.3:a:time_project:time:0.2.15:*:*:*:*:rust:*:*
  • cpe:2.3:a:time_project:time:0.2.16:*:*:*:*:rust:*:*
    cpe:2.3:a:time_project:time:0.2.16:*:*:*:*:rust:*:*
  • cpe:2.3:a:time_project:time:0.2.17:*:*:*:*:rust:*:*
    cpe:2.3:a:time_project:time:0.2.17:*:*:*:*:rust:*:*
  • cpe:2.3:a:time_project:time:0.2.18:*:*:*:*:rust:*:*
    cpe:2.3:a:time_project:time:0.2.18:*:*:*:*:rust:*:*
  • cpe:2.3:a:time_project:time:0.2.19:*:*:*:*:rust:*:*
    cpe:2.3:a:time_project:time:0.2.19:*:*:*:*:rust:*:*
  • cpe:2.3:a:time_project:time:0.2.20:*:*:*:*:rust:*:*
    cpe:2.3:a:time_project:time:0.2.20:*:*:*:*:rust:*:*
  • cpe:2.3:a:time_project:time:0.2.21:*:*:*:*:rust:*:*
    cpe:2.3:a:time_project:time:0.2.21:*:*:*:*:rust:*:*
  • cpe:2.3:a:time_project:time:0.2.22:*:*:*:*:rust:*:*
    cpe:2.3:a:time_project:time:0.2.22:*:*:*:*:rust:*:*
  • cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*
    cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*
CVSS
Base: 3.5 (as of 03-12-2020 - 19:42)
Impact:
Exploitability:
CWE CWE-476
CAPEC
Access
VectorComplexityAuthentication
NETWORK MEDIUM SINGLE
Impact
ConfidentialityIntegrityAvailability
NONE NONE PARTIAL
cvss-vector via4 AV:N/AC:M/Au:S/C:N/I:N/A:P
refmap via4
confirm https://github.com/time-rs/time/security/advisories/GHSA-wcg3-cvx6-7396
misc
Last major update 03-12-2020 - 19:42
Published 24-11-2020 - 22:15
Last modified 03-12-2020 - 19:42
Back to Top