Описание
In the standard library in Rust before 1.50.0, read_to_end() does not validate the return value from Read in an unsafe context. This bug could lead to a buffer overflow.
| Релиз | Статус | Примечание |
|---|---|---|
| bionic | ignored | end of standard support, was needs-triage |
| devel | DNE | |
| esm-apps/bionic | not-affected | 1.51.0+dfsg1+llvm-1~exp3ubuntu1~18.04.1 |
| esm-apps/focal | released | 1.51.0+dfsg1+llvm-1~exp3ubuntu1~20.04.2 |
| esm-apps/xenial | needed | |
| esm-infra-legacy/trusty | needed | |
| focal | released | 1.51.0+dfsg1+llvm-1~exp3ubuntu1~20.04.2 |
| groovy | ignored | end of life |
| hirsute | ignored | end of life |
| impish | ignored | end of life |
Показывать по
EPSS
5 Medium
CVSS2
7.5 High
CVSS3
Связанные уязвимости
In the standard library in Rust before 1.50.0, read_to_end() does not validate the return value from Read in an unsafe context. This bug could lead to a buffer overflow.
In the standard library in Rust before 1.50.0, read_to_end() does not validate the return value from Read in an unsafe context. This bug could lead to a buffer overflow.
In the standard library in Rust before 1.50.0, read_to_end() does not ...
In the standard library in Rust before 1.50.0, read_to_end() does not validate the return value from Read in an unsafe context. This bug could lead to a buffer overflow.
EPSS
5 Medium
CVSS2
7.5 High
CVSS3