-
Notifications
You must be signed in to change notification settings - Fork 9
Open
Labels
Mend: dependency security vulnerabilitySecurity vulnerability detected by WhiteSourceSecurity vulnerability detected by WhiteSource
Description
CVE-2020-36205 - Medium Severity Vulnerability
Vulnerable Library - xcb-0.8.2.crate
Rust bindings and wrappers for XCB
Library home page: https://crates.io/api/v1/crates/xcb/0.8.2/download
Dependency Hierarchy:
- amethyst-0.15.3.crate (Root Library)
- amethyst_ui-0.15.3.crate
- clipboard-0.5.0.crate
- x11-clipboard-0.3.3.crate
- ❌ xcb-0.8.2.crate (Vulnerable Library)
- x11-clipboard-0.3.3.crate
- clipboard-0.5.0.crate
- amethyst_ui-0.15.3.crate
Found in HEAD commit: a5a175063bd51fcbbce0eaba88d1b9b6ad315911
Found in base branch: master
Vulnerability Details
An issue was discovered in the xcb crate through 2020-12-10 for Rust. base::Error does not have soundness. Because of the public ptr field, a use-after-free or double-free can occur.
Publish Date: 2021-01-26
URL: CVE-2020-36205
CVSS 3 Score Details (5.5)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Local
- Attack Complexity: Low
- Privileges Required: Low
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
Suggested Fix
Type: Upgrade version
Origin: https://rustsec.org/advisories/RUSTSEC-2020-0097.html
Release Date: 2021-01-26
Fix Resolution: xcb - 1.0.0
Step up your Open Source Security Game with Mend here
Reactions are currently unavailable
Metadata
Metadata
Assignees
Labels
Mend: dependency security vulnerabilitySecurity vulnerability detected by WhiteSourceSecurity vulnerability detected by WhiteSource