CVE-2021-45687

An issue was discovered in the raw-cpuid crate before 9.1.1 for Rust. If the serialize feature is used (which is not the the default), a Deserialize operation may lack sufficient validation, leading to memory corruption or a panic.
Configurations

Configuration 1 (hide)

cpe:2.3:a:raw-cpuid_project:raw-cpuid:*:*:*:*:*:rust:*:*

History

08 Aug 2023, 14:21

Type Values Removed Values Added
CWE CWE-502 CWE-20

06 Jan 2022, 17:32

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : 6.8
v3 : 9.8
First Time Raw-cpuid Project
Raw-cpuid Project raw-cpuid
CPE cpe:2.3:a:raw-cpuid_project:raw-cpuid:*:*:*:*:*:rust:*:*
CWE CWE-502
References (MISC) https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/raw-cpuid/RUSTSEC-2021-0089.md - (MISC) https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/raw-cpuid/RUSTSEC-2021-0089.md - Third Party Advisory
References (MISC) https://rustsec.org/advisories/RUSTSEC-2021-0089.html - (MISC) https://rustsec.org/advisories/RUSTSEC-2021-0089.html - Third Party Advisory

27 Dec 2021, 00:15

Type Values Removed Values Added
New CVE

Information

Published : 2021-12-27 00:15

Updated : 2023-12-10 14:09


NVD link : CVE-2021-45687

Mitre link : CVE-2021-45687

CVE.ORG link : CVE-2021-45687


JSON object : View

Products Affected

raw-cpuid_project

  • raw-cpuid
CWE
CWE-20

Improper Input Validation