Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2020-36323

Опубликовано: 14 апр. 2021
Источник: debian
EPSS Низкий

Описание

In the standard library in Rust before 1.52.0, there is an optimization for joining strings that can cause uninitialized bytes to be exposed (or the program to crash) if the borrowed string changes after its length is checked.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
rustcfixed1.53.0+dfsg1-1package
rustcno-dsabullseyepackage
rustcno-dsabusterpackage
rustcno-dsastretchpackage

Примечания

  • https://github.com/rust-lang/rust/issues/80335

  • https://github.com/rust-lang/rust/pull/81728

EPSS

Процентиль: 71%
0.00709
Низкий

Связанные уязвимости

CVSS3: 8.2
ubuntu
больше 4 лет назад

In the standard library in Rust before 1.52.0, there is an optimization for joining strings that can cause uninitialized bytes to be exposed (or the program to crash) if the borrowed string changes after its length is checked.

CVSS3: 8.2
redhat
больше 4 лет назад

In the standard library in Rust before 1.52.0, there is an optimization for joining strings that can cause uninitialized bytes to be exposed (or the program to crash) if the borrowed string changes after its length is checked.

CVSS3: 8.2
nvd
больше 4 лет назад

In the standard library in Rust before 1.52.0, there is an optimization for joining strings that can cause uninitialized bytes to be exposed (or the program to crash) if the borrowed string changes after its length is checked.

CVSS3: 8.2
msrc
больше 4 лет назад

Описание отсутствует

CVSS3: 8.2
github
около 3 лет назад

In the standard library in Rust before 1.50.3, there is an optimization for joining strings that can cause uninitialized bytes to be exposed (or the program to crash) if the borrowed string changes after its length is checked.

EPSS

Процентиль: 71%
0.00709
Низкий