Описание
In the standard library in Rust before 1.52.0, the Zip implementation calls __iterator_get_unchecked() more than once for the same index (under certain conditions) when next_back() and next() are used together. This bug could lead to a memory safety violation due to an unmet safety requirement for the TrustedRandomAccess trait.
Релиз | Статус | Примечание |
---|---|---|
bionic | ignored | end of standard support, was needed |
devel | DNE | |
esm-apps/bionic | not-affected | 1.53.0+dfsg1+llvm-4ubuntu1~18.04.1 |
esm-apps/focal | released | 1.53.0+dfsg1+llvm-4ubuntu1~20.04.1 |
esm-apps/xenial | needed | |
esm-infra-legacy/trusty | needed | |
focal | released | 1.53.0+dfsg1+llvm-4ubuntu1~20.04.1 |
groovy | ignored | end of life |
hirsute | ignored | end of life |
impish | ignored | end of life |
Показывать по
EPSS
4.3 Medium
CVSS2
7.5 High
CVSS3
Связанные уязвимости
In the standard library in Rust before 1.52.0, the Zip implementation calls __iterator_get_unchecked() more than once for the same index (under certain conditions) when next_back() and next() are used together. This bug could lead to a memory safety violation due to an unmet safety requirement for the TrustedRandomAccess trait.
In the standard library in Rust before 1.52.0, the Zip implementation calls __iterator_get_unchecked() more than once for the same index (under certain conditions) when next_back() and next() are used together. This bug could lead to a memory safety violation due to an unmet safety requirement for the TrustedRandomAccess trait.
In the standard library in Rust before 1.52.0, the Zip implementation ...
In the standard library in Rust before 1.52.0, the Zip implementation calls __iterator_get_unchecked() more than once for the same index (under certain conditions) when next_back() and next() are used together. This bug could lead to a memory safety violation due to an unmet safety requirement for the TrustedRandomAccess trait.
EPSS
4.3 Medium
CVSS2
7.5 High
CVSS3