VYPR
High severityNVD Advisory· Published Sep 9, 2019· Updated Aug 5, 2024

CVE-2019-16144

CVE-2019-16144

Description

An issue was discovered in the generator crate before 0.6.18 for Rust. Uninitialized memory is used by Scope, done, and yield_ during API calls.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

The generator crate for Rust before 0.6.18 uses uninitialized memory in Scope, done, and yield_ APIs, leading to potential memory corruption.

Description

The generator crate for Rust (version before 0.6.18) suffers from unsound APIs that use uninitialized memory in the Scope, done, and yield_ functions [1][3]. This leads to undefined behavior (UB) and potential memory corruption, as reported in GitHub issue #9 and #14 [2].

Exploitation

An attacker can trigger the vulnerability by calling the affected APIs in any application that uses the generator crate. The CVSS vector is AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H, indicating a network attack vector with low complexity and no required privileges or user interaction [3]. This makes it exploitable remotely without authentication.

Impact

Successful exploitation can cause a denial of service (availability impact) due to memory corruption. There is no direct impact on confidentiality or integrity, but UB can lead to unpredictable behavior [3].

Mitigation

The issue is fixed in generator crate version 0.6.18 and later [3]. Users should update to the latest patched version.

AI Insight generated on May 22, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
generatorcrates.io
< 0.6.180.6.18

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

7

News mentions

0

No linked articles in our index yet.