rustsec-2018-0012
Vulnerability from osv_rustsec
Published
2018-12-20 12:00
Modified
2023-06-13 13:10
Summary
Flaw in streaming state reset() functions can create incorrect results.
Details
Affected versions of this crate did not properly reset a streaming state.
Resetting a streaming state, without finalising it first, creates incorrect results.
The flaw was corrected by not first checking if the state had already been reset, when calling reset().
Severity
7.5 (High)
References
| URL | Type | |
|---|---|---|
{
"affected": [
{
"database_specific": {
"categories": [],
"cvss": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"informational": null
},
"ecosystem_specific": {
"affected_functions": null,
"affects": {
"arch": [],
"functions": [],
"os": []
}
},
"package": {
"ecosystem": "crates.io",
"name": "orion",
"purl": "pkg:cargo/orion"
},
"ranges": [
{
"events": [
{
"introduced": "0.0.0-0"
},
{
"fixed": "0.11.2"
}
],
"type": "SEMVER"
}
],
"versions": []
}
],
"aliases": [
"CVE-2018-20999",
"GHSA-gffv-5hr2-f9gj"
],
"database_specific": {
"license": "CC0-1.0"
},
"details": "Affected versions of this crate did not properly reset a streaming state.\n\nResetting a streaming state, without finalising it first, creates incorrect results.\n \nThe flaw was corrected by not first checking if the state had already been reset, when calling reset().",
"id": "RUSTSEC-2018-0012",
"modified": "2023-06-13T13:10:24Z",
"published": "2018-12-20T12:00:00Z",
"references": [
{
"type": "PACKAGE",
"url": "https://crates.io/crates/orion"
},
{
"type": "ADVISORY",
"url": "https://rustsec.org/advisories/RUSTSEC-2018-0012.html"
},
{
"type": "REPORT",
"url": "https://github.com/brycx/orion/issues/46"
}
],
"related": [],
"severity": [
{
"score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
],
"summary": "Flaw in streaming state reset() functions can create incorrect results."
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…