CVE-2020-35919 – socket2
Package
Manager: cargo
Name: socket2
Vulnerable Version: >=0 <0.3.16
Severity
Level: Medium
CVSS v3.1: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
EPSS: 0.00054 pctl0.16895
Details
socket2 invalidly assumes the memory layout of std::net::SocketAddr The socket2 crate has assumed `std::net::SocketAddrV4` and `std::net::SocketAddrV6` have the same memory layout as the system C representation `sockaddr`. It has simply casted the pointers to convert the socket addresses to the system representation. The standard library does not say anything about the memory layout, and this will cause invalid memory access if the standard library changes the implementation. No warnings or errors will be emitted once the change happens.
Metadata
Created: 2021-08-25T20:50:37Z
Modified: 2024-02-12T15:55:27Z
Source: https://osv-vulnerabilities
CWE IDs: ["CWE-188"]
Alternative ID: N/A
Finding: F067
Auto approve: 1