Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2021-28875

Опубликовано: 11 апр. 2021
Источник: debian
EPSS Низкий

Описание

In the standard library in Rust before 1.50.0, read_to_end() does not validate the return value from Read in an unsafe context. This bug could lead to a buffer overflow.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
rustcfixed1.53.0+dfsg1-1package
rustcno-dsabullseyepackage
rustcno-dsabusterpackage
rustcno-dsastretchpackage

Примечания

  • https://github.com/rust-lang/rust/issues/80894

  • https://github.com/rust-lang/rust/pull/80895

EPSS

Процентиль: 43%
0.00204
Низкий

Связанные уязвимости

CVSS3: 7.5
ubuntu
больше 4 лет назад

In the standard library in Rust before 1.50.0, read_to_end() does not validate the return value from Read in an unsafe context. This bug could lead to a buffer overflow.

CVSS3: 7.5
redhat
больше 4 лет назад

In the standard library in Rust before 1.50.0, read_to_end() does not validate the return value from Read in an unsafe context. This bug could lead to a buffer overflow.

CVSS3: 7.5
nvd
больше 4 лет назад

In the standard library in Rust before 1.50.0, read_to_end() does not validate the return value from Read in an unsafe context. This bug could lead to a buffer overflow.

CVSS3: 7.5
msrc
больше 4 лет назад

Описание отсутствует

CVSS3: 7.5
github
около 3 лет назад

In the standard library in Rust before 1.50.0, read_to_end() does not validate the return value from Read in an unsafe context. This bug could lead to a buffer overflow.

EPSS

Процентиль: 43%
0.00204
Низкий