CVE-2021-45687

An issue was discovered in the raw-cpuid crate before 9.1.1 for Rust. If the serialize feature is used (which is not the the default), a Deserialize operation may lack sufficient validation, leading to memory corruption or a panic.
Configurations

Configuration 1 (hide)

cpe:2.3:a:raw-cpuid_project:raw-cpuid:*:*:*:*:*:rust:*:*

History

21 Nov 2024, 06:32

Type Values Removed Values Added
References () https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/raw-cpuid/RUSTSEC-2021-0089.md - Third Party Advisory () https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/raw-cpuid/RUSTSEC-2021-0089.md - Third Party Advisory
References () https://rustsec.org/advisories/RUSTSEC-2021-0089.html - Third Party Advisory () https://rustsec.org/advisories/RUSTSEC-2021-0089.html - Third Party Advisory

08 Aug 2023, 14:21

Type Values Removed Values Added
CWE CWE-502 CWE-20

Information

Published : 2021-12-27 00:15

Updated : 2024-11-21 06:32


NVD link : CVE-2021-45687

Mitre link : CVE-2021-45687

CVE.ORG link : CVE-2021-45687


JSON object : View

Products Affected

raw-cpuid_project

  • raw-cpuid
CWE
CWE-20

Improper Input Validation