Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2021-28875

Опубликовано: 10 янв. 2021
Источник: redhat
CVSS3: 7.5
EPSS Низкий

Описание

In the standard library in Rust before 1.50.0, read_to_end() does not validate the return value from Read in an unsafe context. This bug could lead to a buffer overflow.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 9rustNot affected
Red Hat Developer Toolsrust-toolset-1.52FixedRHSA-2021:304210.08.2021
Red Hat Developer Toolsrust-toolset-1.52-rustFixedRHSA-2021:304210.08.2021
Red Hat Enterprise Linux 8rust-toolsetFixedRHSA-2021:306310.08.2021

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-119
https://bugzilla.redhat.com/show_bug.cgi?id=1949194rust: heap-based buffer overflow in read_to_end() because it does not validate the return value from Read in an unsafe context

EPSS

Процентиль: 43%
0.00204
Низкий

7.5 High

CVSS3

Связанные уязвимости

CVSS3: 7.5
ubuntu
больше 4 лет назад

In the standard library in Rust before 1.50.0, read_to_end() does not validate the return value from Read in an unsafe context. This bug could lead to a buffer overflow.

CVSS3: 7.5
nvd
больше 4 лет назад

In the standard library in Rust before 1.50.0, read_to_end() does not validate the return value from Read in an unsafe context. This bug could lead to a buffer overflow.

CVSS3: 7.5
msrc
больше 4 лет назад

Описание отсутствует

CVSS3: 7.5
debian
больше 4 лет назад

In the standard library in Rust before 1.50.0, read_to_end() does not ...

CVSS3: 7.5
github
около 3 лет назад

In the standard library in Rust before 1.50.0, read_to_end() does not validate the return value from Read in an unsafe context. This bug could lead to a buffer overflow.

EPSS

Процентиль: 43%
0.00204
Низкий

7.5 High

CVSS3