Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLTVycnYtbTM2aC1xd2Y4
Use-after-free in chttp
The From implementation for Vec was not properly implemented, returning a vector backed by freed memory. This could lead to memory corruption or be exploited to cause undefined behavior.
A fix was published in version 0.1.3.
Permalink: https://github.com/advisories/GHSA-5rrv-m36h-qwf8JSON: https://advisories.ecosyste.ms/api/v1/advisories/MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLTVycnYtbTM2aC1xd2Y4
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Critical
Classification: General
Published: about 3 years ago
Updated: about 1 year ago
CVSS Score: 9.8
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Identifiers: GHSA-5rrv-m36h-qwf8, CVE-2019-16140
References:
- https://nvd.nist.gov/vuln/detail/CVE-2019-16140
- https://github.com/sagebind/isahc/issues/2
- https://rustsec.org/advisories/RUSTSEC-2019-0016.html
- https://github.com/sagebind/isahc/commit/9e9f1fb44114078c000c78c72e691eeb9e7ac260
- https://github.com/advisories/GHSA-5rrv-m36h-qwf8
Blast Radius: 6.8
Affected Packages
cargo:chttp
Dependent packages: 3Dependent repositories: 5
Downloads: 68,756 total
Affected Version Ranges: >= 0.1.1, < 0.1.3
Fixed in: 0.1.3
All affected versions: 0.1.1, 0.1.2
All unaffected versions: 0.1.3, 0.1.4, 0.1.5, 0.2.0, 0.2.1, 0.2.2, 0.2.3, 0.2.4, 0.3.0, 0.3.1, 0.4.0, 0.4.1, 0.4.2, 0.4.3, 0.4.4, 0.4.5, 0.5.0, 0.5.1, 0.5.2, 0.5.3, 0.5.4, 0.5.5