Vulnerabilities affecting this package (0)
| Vulnerability |
Summary |
Fixed by |
|
This package is not known to be affected by vulnerabilities.
|
Vulnerabilities fixed by this package (4)
| Vulnerability |
Summary |
Aliases |
|
VCID-dnx4-ezu6-ffdn
|
rust: Rust standard library did not properly escape arguments when invoking batch files on Windows using the Command API
|
CVE-2024-43402
|
|
VCID-eahp-bdsv-mycz
|
The Rust Programming Language Standard Library 1.34.x before 1.34.2 contains a stabilized method which, if overridden, can violate Rust's safety guarantees and cause memory unsafety. If the `Error::type_id` method is overridden then any type can be safely cast to any other type, causing memory safety vulnerabilities in safe code (e.g., out-of-bounds write or read). Code that does not manually implement Error::type_id is unaffected.
|
CVE-2019-12083
|
|
VCID-g6ey-xfpk-ayck
|
rust: Rust standard library didn't detect all path separators on Cygwin
|
CVE-2025-11233
|
|
VCID-mwu8-vn8b-rfb3
|
rust: Fail to Escape Arguments Properly in Microsoft Windows
|
CVE-2024-24576
|