Описание
In the standard library in Rust before 1.50.0, read_to_end() does not validate the return value from Read in an unsafe context. This bug could lead to a buffer overflow.
Затронутые пакеты
Платформа | Пакет | Состояние | Рекомендация | Релиз |
---|---|---|---|---|
Red Hat Enterprise Linux 9 | rust | Not affected | ||
Red Hat Developer Tools | rust-toolset-1.52 | Fixed | RHSA-2021:3042 | 10.08.2021 |
Red Hat Developer Tools | rust-toolset-1.52-rust | Fixed | RHSA-2021:3042 | 10.08.2021 |
Red Hat Enterprise Linux 8 | rust-toolset | Fixed | RHSA-2021:3063 | 10.08.2021 |
Показывать по
Дополнительная информация
Статус:
EPSS
7.5 High
CVSS3
Связанные уязвимости
In the standard library in Rust before 1.50.0, read_to_end() does not validate the return value from Read in an unsafe context. This bug could lead to a buffer overflow.
In the standard library in Rust before 1.50.0, read_to_end() does not validate the return value from Read in an unsafe context. This bug could lead to a buffer overflow.
In the standard library in Rust before 1.50.0, read_to_end() does not ...
In the standard library in Rust before 1.50.0, read_to_end() does not validate the return value from Read in an unsafe context. This bug could lead to a buffer overflow.
EPSS
7.5 High
CVSS3