Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2021-28878

Опубликовано: 11 апр. 2021
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 4.3
CVSS3: 7.5

Описание

In the standard library in Rust before 1.52.0, the Zip implementation calls __iterator_get_unchecked() more than once for the same index (under certain conditions) when next_back() and next() are used together. This bug could lead to a memory safety violation due to an unmet safety requirement for the TrustedRandomAccess trait.

РелизСтатусПримечание
bionic

ignored

end of standard support, was needed
devel

DNE

esm-apps/bionic

not-affected

1.53.0+dfsg1+llvm-4ubuntu1~18.04.1
esm-apps/focal

released

1.53.0+dfsg1+llvm-4ubuntu1~20.04.1
esm-apps/xenial

needed

esm-infra-legacy/trusty

needed

focal

released

1.53.0+dfsg1+llvm-4ubuntu1~20.04.1
groovy

ignored

end of life
hirsute

ignored

end of life
impish

ignored

end of life

Показывать по

EPSS

Процентиль: 33%
0.00125
Низкий

4.3 Medium

CVSS2

7.5 High

CVSS3

Связанные уязвимости

CVSS3: 7.5
redhat
больше 4 лет назад

In the standard library in Rust before 1.52.0, the Zip implementation calls __iterator_get_unchecked() more than once for the same index (under certain conditions) when next_back() and next() are used together. This bug could lead to a memory safety violation due to an unmet safety requirement for the TrustedRandomAccess trait.

CVSS3: 7.5
nvd
больше 4 лет назад

In the standard library in Rust before 1.52.0, the Zip implementation calls __iterator_get_unchecked() more than once for the same index (under certain conditions) when next_back() and next() are used together. This bug could lead to a memory safety violation due to an unmet safety requirement for the TrustedRandomAccess trait.

CVSS3: 7.5
msrc
больше 4 лет назад

Описание отсутствует

CVSS3: 7.5
debian
больше 4 лет назад

In the standard library in Rust before 1.52.0, the Zip implementation ...

CVSS3: 7.5
github
около 3 лет назад

In the standard library in Rust before 1.52.0, the Zip implementation calls __iterator_get_unchecked() more than once for the same index (under certain conditions) when next_back() and next() are used together. This bug could lead to a memory safety violation due to an unmet safety requirement for the TrustedRandomAccess trait.

EPSS

Процентиль: 33%
0.00125
Низкий

4.3 Medium

CVSS2

7.5 High

CVSS3