GHSA-RC23-XXGQ-X27G

Vulnerability from github – Published: 2022-09-16 17:18 – Updated: 2022-09-16 17:18
VLAI?
Summary
wee_alloc is Unmaintained
Details

Two of the maintainers have indicated that the crate may not be maintained.

The crate has open issues including memory leaks and may not be suitable for production use.

It may be best to switch to the default Rust standard allocator on wasm32 targets.

Last release seems to have been three years ago.

Show details on source website

{
  "affected": [
    {
      "package": {
        "ecosystem": "crates.io",
        "name": "wee_alloc"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    }
  ],
  "aliases": [],
  "database_specific": {
    "cwe_ids": [],
    "github_reviewed": true,
    "github_reviewed_at": "2022-09-16T17:18:28Z",
    "nvd_published_at": null,
    "severity": "CRITICAL"
  },
  "details": "Two of the maintainers have indicated that the crate may not be maintained.\n\nThe crate has open issues including memory leaks and may not be suitable for production use.\n\nIt may be best to switch to the default Rust standard allocator on wasm32 targets.\n\nLast release seems to have been three years ago.",
  "id": "GHSA-rc23-xxgq-x27g",
  "modified": "2022-09-16T17:18:28Z",
  "published": "2022-09-16T17:18:28Z",
  "references": [
    {
      "type": "WEB",
      "url": "https://github.com/rustwasm/wee_alloc/issues/107"
    },
    {
      "type": "PACKAGE",
      "url": "https://github.com/rustwasm/wee_alloc"
    },
    {
      "type": "WEB",
      "url": "https://rustsec.org/advisories/RUSTSEC-2022-0054.html"
    }
  ],
  "schema_version": "1.4.0",
  "severity": [],
  "summary": "wee_alloc is Unmaintained"
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…