CVE-2020-36323

Name
CVE-2020-36323
Description
In the standard library in Rust before 1.52.0, there is an optimization for joining strings that can cause uninitialized bytes to be exposed (or the program to crash) if the borrowed string changes after its length is checked.
NVD Severity
high
Other trackers
Mailing lists
Exploits
Forges
GitHub (code, issues), Aports (code, issues)

References

Type URI
Patch https://github.com/rust-lang/rust/issues/80335
Patch https://github.com/rust-lang/rust/pull/81728
Patch https://github.com/rust-lang/rust/pull/81728#issuecomment-821549174
Mailing List https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CZ337CM4GFJLRDFVQCGC7J25V65JXOG5/
Patch https://github.com/rust-lang/rust/pull/81728#issuecomment-824904190
Mailing List https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TFUO3URYCO73D2Q4WYJBWAMJWGGVXQO4/
Mailing List https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VZG65GUW6Z2CYOQHF7T3TB5CZKIX6ZJE/

Match rules

CPE URI Source package Min version Max version
cpe:2.3:a:rust-lang:rust:*:*:*:*:*:*:*:* rust >= None < 1.50.3
cpe:2.3:a:rust-lang:rust:*:*:*:*:*:*:*:* rust >= None < 1.52.0

Vulnerable and fixed packages

Source package Branch Version Maintainer Status
rust 3.13-community 1.47.0-r2 Rasmus Thomsen <oss@cogitri.dev> possibly vulnerable