Описание
In the standard library in Rust before 1.50.0, read_to_end() does not validate the return value from Read in an unsafe context. This bug could lead to a buffer overflow.
Релиз | Статус | Примечание |
---|---|---|
bionic | ignored | end of standard support, was needs-triage |
devel | DNE | |
esm-apps/bionic | not-affected | 1.51.0+dfsg1+llvm-1~exp3ubuntu1~18.04.1 |
esm-apps/focal | released | 1.51.0+dfsg1+llvm-1~exp3ubuntu1~20.04.2 |
esm-apps/xenial | needed | |
esm-infra-legacy/trusty | needed | |
focal | released | 1.51.0+dfsg1+llvm-1~exp3ubuntu1~20.04.2 |
groovy | ignored | end of life |
hirsute | ignored | end of life |
impish | ignored | end of life |
Показывать по
EPSS
5 Medium
CVSS2
7.5 High
CVSS3
Связанные уязвимости
In the standard library in Rust before 1.50.0, read_to_end() does not validate the return value from Read in an unsafe context. This bug could lead to a buffer overflow.
In the standard library in Rust before 1.50.0, read_to_end() does not validate the return value from Read in an unsafe context. This bug could lead to a buffer overflow.
In the standard library in Rust before 1.50.0, read_to_end() does not ...
In the standard library in Rust before 1.50.0, read_to_end() does not validate the return value from Read in an unsafe context. This bug could lead to a buffer overflow.
EPSS
5 Medium
CVSS2
7.5 High
CVSS3