Vulnerability Description
In the standard library in Rust before 1.50.0, read_to_end() does not validate the return value from Read in an unsafe context. This bug could lead to a buffer overflow.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Rust-Lang | Rust | < 1.50.0 |
Related Weaknesses (CWE)
References
- https://github.com/rust-lang/rust/issues/80894ExploitIssue TrackingPatch
- https://github.com/rust-lang/rust/pull/80895PatchThird Party Advisory
- https://security.gentoo.org/glsa/202210-09Third Party Advisory
- https://github.com/rust-lang/rust/issues/80894ExploitIssue TrackingPatch
- https://github.com/rust-lang/rust/pull/80895PatchThird Party Advisory
- https://security.gentoo.org/glsa/202210-09Third Party Advisory
FAQ
What is CVE-2021-28875?
CVE-2021-28875 is a vulnerability with a CVSS score of 7.5 (HIGH). In the standard library in Rust before 1.50.0, read_to_end() does not validate the return value from Read in an unsafe context. This bug could lead to a buffer overflow.
How severe is CVE-2021-28875?
CVE-2021-28875 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2021-28875?
Check the references section above for vendor advisories and patch information. Affected products include: Rust-Lang Rust.