An issue in miow crate before 0.3.6 for Rust, with false expectations about std::net::SocketAddr memory representation. CVE-2020-3592
Reporter | Title | Published | Views | Family All 11 |
---|---|---|---|---|
![]() | Memory corruption | 31 Dec 202009:15 | – | prion |
![]() | CVE-2020-35921 | 31 Dec 202009:15 | – | nvd |
![]() | miow invalidly assumes the memory layout of std::net::SocketAddr | 25 Aug 202120:50 | – | github |
![]() | Unspecified Vulnerability in Rust (CNVD-2021-39164) | 6 Jan 202100:00 | – | cnvd |
![]() | CVE-2020-35921 | 31 Dec 202009:15 | – | osv |
![]() | `miow` invalidly assumes the memory layout of std::net::SocketAddr | 13 Nov 202012:00 | – | osv |
![]() | miow invalidly assumes the memory layout of std::net::SocketAddr | 25 Aug 202120:50 | – | osv |
![]() | CVE-2020-35921 | 31 Dec 202009:15 | – | debiancve |
![]() | CVE-2020-35921 | 31 Dec 202000:00 | – | ubuntucve |
![]() | CVE-2020-35921 | 31 Dec 202008:17 | – | cvelist |
Source | Link |
---|---|
rustsec | www.rustsec.org/advisories/RUSTSEC-2020-0080.html |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo