Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2020-36323

Опубликовано: 23 дек. 2020
Источник: redhat
CVSS3: 8.2
EPSS Низкий

Описание

In the standard library in Rust before 1.52.0, there is an optimization for joining strings that can cause uninitialized bytes to be exposed (or the program to crash) if the borrowed string changes after its length is checked.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 9rustNot affected
Red Hat Developer Toolsrust-toolset-1.52FixedRHSA-2021:304210.08.2021
Red Hat Developer Toolsrust-toolset-1.52-rustFixedRHSA-2021:304210.08.2021
Red Hat Enterprise Linux 8rust-toolsetFixedRHSA-2021:306310.08.2021

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-20
https://bugzilla.redhat.com/show_bug.cgi?id=1950396rust: optimization for joining strings can cause uninitialized bytes to be exposed

EPSS

Процентиль: 71%
0.00709
Низкий

8.2 High

CVSS3

Связанные уязвимости

CVSS3: 8.2
ubuntu
больше 4 лет назад

In the standard library in Rust before 1.52.0, there is an optimization for joining strings that can cause uninitialized bytes to be exposed (or the program to crash) if the borrowed string changes after its length is checked.

CVSS3: 8.2
nvd
больше 4 лет назад

In the standard library in Rust before 1.52.0, there is an optimization for joining strings that can cause uninitialized bytes to be exposed (or the program to crash) if the borrowed string changes after its length is checked.

CVSS3: 8.2
msrc
больше 4 лет назад

Описание отсутствует

CVSS3: 8.2
debian
больше 4 лет назад

In the standard library in Rust before 1.52.0, there is an optimizatio ...

CVSS3: 8.2
github
около 3 лет назад

In the standard library in Rust before 1.50.3, there is an optimization for joining strings that can cause uninitialized bytes to be exposed (or the program to crash) if the borrowed string changes after its length is checked.

EPSS

Процентиль: 71%
0.00709
Низкий

8.2 High

CVSS3