If your @rustlang code uses std::mem::uninitialized() and can panic while referencing uninitialized memory, it's a potential security vulnerability:https://twitter.com/RustSec/status/1151587254990602240 …
• Very Low: No known vulnerable code, code exec does not seem possible • Low: No known vulnerable code but RCE thereoretically possible OR only DoS possible in the wild • Medium and above: Known vulnerable code, RCE at least theoretically possible
-
-
“Uninitialized” often means “previously initialized, possibly by someone bad”. I wouldn’t dismiss this bug as inexploitable.
-
As far as I can tell it's just a null dereference or a ud2 at worst right now, not uninitialized memory reads.
- 8 more replies
New conversation -
-
-
There's been some discussion about using CVSS scores, which are needed for obtaining CVEs. I'm not a huge fan of CVSS, but if we have to do it anyway it seems like the right way to go, and the could be lumped into low/medium/high severity buckets for display/filtering purposes.
Thanks. Twitter will use this to make your timeline better. UndoUndo
-
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.