Show filters
219 Total Results
Displaying 51-60 of 219
Sort by:
Attacker Value
Unknown

CVE-2021-43619

Disclosure Date: March 01, 2022 (last updated February 23, 2025)
Trusted Firmware M 1.4.x through 1.4.1 has a buffer overflow issue in the Firmware Update partition. In the IPC model, a psa_fwu_write caller from SPE or NSPE can overwrite stack memory locations.
Attacker Value
Unknown

CVE-2022-21658

Disclosure Date: January 20, 2022 (last updated February 23, 2025)
Rust is a multi-paradigm, general-purpose programming language designed for performance and safety, especially safe concurrency. The Rust Security Response WG was notified that the `std::fs::remove_dir_all` standard library function is vulnerable a race condition enabling symlink following (CWE-363). An attacker could use this security issue to trick a privileged program into deleting files and directories the attacker couldn't otherwise access or delete. Rust 1.0.0 through Rust 1.58.0 is affected by this vulnerability with 1.58.1 containing a patch. Note that the following build targets don't have usable APIs to properly mitigate the attack, and are thus still vulnerable even with a patched toolchain: macOS before version 10.10 (Yosemite) and REDOX. We recommend everyone to update to Rust 1.58.1 as soon as possible, especially people developing programs expected to run in privileged contexts (including system daemons and setuid binaries), as those have the highest risk of being affec…
Attacker Value
Unknown

CVE-2021-40327

Disclosure Date: January 13, 2022 (last updated February 23, 2025)
Trusted Firmware-M (TF-M) 1.4.0, when Profile Small is used, has incorrect access control. NSPE can access a secure key (held by the Crypto service) based solely on knowledge of its key ID. For example, there is no authorization check associated with the relationship between a caller and a key owner.
Attacker Value
Unknown

CVE-2021-45712

Disclosure Date: December 26, 2021 (last updated February 23, 2025)
An issue was discovered in the rust-embed crate before 6.3.0 for Rust. A ../ directory traversal can sometimes occur in debug mode.
Attacker Value
Unknown

CVE-2020-36470

Disclosure Date: August 08, 2021 (last updated November 29, 2024)
An issue was discovered in the disrustor crate through 2020-12-17 for Rust. RingBuffer doe not properly limit the number of mutable references.
Attacker Value
Unknown

CVE-2021-29922

Disclosure Date: August 07, 2021 (last updated November 28, 2024)
library/std/src/net/parser.rs in Rust before 1.53.0 does not properly consider extraneous zero characters at the beginning of an IP address string, which (in some situations) allows attackers to bypass access control that is based on IP addresses, because of unexpected octal interpretation.
Attacker Value
Unknown

CVE-2021-20332

Disclosure Date: August 02, 2021 (last updated February 23, 2025)
Specific MongoDB Rust Driver versions can include credentials used by the connection pool to authenticate connections in the monitoring event that is emitted when the pool is created. The user's logging infrastructure could then potentially ingest these events and unexpectedly leak the credentials. Note that such monitoring is not enabled by default. This issue affects MongoDB Rust Driver version 2.0.0-alpha, MongoDB Rust Driver version 2.0.0-alpha1 and MongoDB Rust Driver version 1.0.0 through to and including 1.2.1
Attacker Value
Unknown

CVE-2021-27562

Disclosure Date: May 25, 2021 (last updated February 22, 2025)
In Arm Trusted Firmware M through 1.2, the NS world may trigger a system halt, an overwrite of secure data, or the printing out of secure data when calling secure functions under the NSPE handler mode.
Attacker Value
Unknown

CVE-2021-32032

Disclosure Date: May 21, 2021 (last updated February 22, 2025)
In Trusted Firmware-M through 1.3.0, cleaning up the memory allocated for a multi-part cryptographic operation (in the event of a failure) can prevent the abort() operation in the associated cryptographic library from freeing internal resources, causing a memory leak.
Attacker Value
Unknown

CVE-2018-25008

Disclosure Date: April 14, 2021 (last updated February 22, 2025)
In the standard library in Rust before 1.29.0, there is weak synchronization in the Arc::get_mut method. This synchronization issue can be lead to memory safety issues through race conditions.