3 results (0.005 seconds)

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 0

An issue was discovered in the tremor-script crate before 0.11.6 for Rust. A patch operation may result in a use-after-free. Se ha detectado un problema en la crate tremor-script versiones anteriores a 0.11.6 para Rust. Una operación de parcheado puede resultar en un uso de memoria previamente liberada • https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/tremor-script/RUSTSEC-2021-0111.md https://rustsec.org/advisories/RUSTSEC-2021-0111.html • CWE-416: Use After Free •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

An issue was discovered in the tremor-script crate before 0.11.6 for Rust. A merge operation may result in a use-after-free. Se ha detectado un problema en la crate tremor-script versiones anteriores a 0.11.6 para Rust. Una operación de fusión puede resultar en un uso de memoria previamente liberada • https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/tremor-script/RUSTSEC-2021-0111.md https://rustsec.org/advisories/RUSTSEC-2021-0111.html • CWE-416: Use After Free •

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 1

Tremor is an event processing system for unstructured data. A vulnerability exists between versions 0.7.2 and 0.11.6. This vulnerability is a memory safety Issue when using `patch` or `merge` on `state` and assign the result back to `state`. In this case, affected versions of Tremor and the tremor-script crate maintains references to memory that might have been freed already. And these memory regions can be accessed by retrieving the `state`, e.g. send it over TCP or HTTP. • https://github.com/tremor-rs/tremor-runtime/commit/1a2efcdbe68e5e7fd0a05836ac32d2cde78a0b2e https://github.com/tremor-rs/tremor-runtime/pull/1217 https://github.com/tremor-rs/tremor-runtime/releases/tag/v0.11.6 https://github.com/tremor-rs/tremor-runtime/security/advisories/GHSA-mc22-5q92-8v85 • CWE-416: Use After Free CWE-825: Expired Pointer Dereference •