Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2020-36323

Опубликовано: 14 апр. 2021
Источник: debian
EPSS Низкий

Описание

In the standard library in Rust before 1.52.0, there is an optimization for joining strings that can cause uninitialized bytes to be exposed (or the program to crash) if the borrowed string changes after its length is checked.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
rustcfixed1.53.0+dfsg1-1package
rustcno-dsabullseyepackage
rustcno-dsabusterpackage
rustcno-dsastretchpackage

Примечания

  • https://github.com/rust-lang/rust/issues/80335

  • https://github.com/rust-lang/rust/pull/81728

EPSS

Процентиль: 72%
0.00705
Низкий

Связанные уязвимости

CVSS3: 8.2
ubuntu
почти 5 лет назад

In the standard library in Rust before 1.52.0, there is an optimization for joining strings that can cause uninitialized bytes to be exposed (or the program to crash) if the borrowed string changes after its length is checked.

CVSS3: 8.2
redhat
около 5 лет назад

In the standard library in Rust before 1.52.0, there is an optimization for joining strings that can cause uninitialized bytes to be exposed (or the program to crash) if the borrowed string changes after its length is checked.

CVSS3: 8.2
nvd
почти 5 лет назад

In the standard library in Rust before 1.52.0, there is an optimization for joining strings that can cause uninitialized bytes to be exposed (or the program to crash) if the borrowed string changes after its length is checked.

CVSS3: 8.2
msrc
почти 5 лет назад

Описание отсутствует

CVSS3: 8.2
github
больше 3 лет назад

In the standard library in Rust before 1.50.3, there is an optimization for joining strings that can cause uninitialized bytes to be exposed (or the program to crash) if the borrowed string changes after its length is checked.

EPSS

Процентиль: 72%
0.00705
Низкий