
Cloud Vulnerability DB
A community-led vulnerabilities database
A vulnerability was discovered in the Deno core runtime (RUSTSEC-2024-0403) where an exposed op_panic operation in the base runtime could be exploited to force a panic in the runtime's containing thread. The issue was identified and reported on July 18, 2024 (GitHub Issue).
The vulnerability stems from the Deno.core.ops.op_panic operation being available by default in the runtime environment. When called, this operation can force a panic in the thread containing the runtime, which breaks the intended sandboxing mechanisms (GitHub Issue).
The exploitation of this vulnerability could lead to a Denial of Service (DoS) condition by forcing panics in the runtime's containing thread. This violates the sandbox isolation principles that should prevent such direct runtime manipulation (GitHub Issue).
A workaround has been proposed to stub out the panic operation by implementing: Deno.core.ops.op_panic = (msg) => { throw new Error(msg) }; This modification prevents the direct panic in the runtime thread while maintaining error handling functionality (GitHub Issue).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."