vulnerability

CentOS Linux: CVE-2020-36323: Moderate: rust-toolset:rhel8 security, bug fix, and enhancement update (CESA-2021:3063)

Severity
6
CVSS
(AV:N/AC:L/Au:N/C:P/I:N/A:P)
Published
Apr 14, 2021
Added
Aug 12, 2021
Modified
May 25, 2023

Description

In the standard library in Rust before 1.52.0, there is an optimization for joining strings that can cause uninitialized bytes to be exposed (or the program to crash) if the borrowed string changes after its length is checked.

Solutions

centos-upgrade-cargocentos-upgrade-cargo-debuginfocentos-upgrade-cargo-doccentos-upgrade-clippycentos-upgrade-clippy-debuginfocentos-upgrade-rlscentos-upgrade-rls-debuginfocentos-upgrade-rustcentos-upgrade-rust-analysiscentos-upgrade-rust-debugger-commoncentos-upgrade-rust-debuginfocentos-upgrade-rust-debugsourcecentos-upgrade-rust-doccentos-upgrade-rust-gdbcentos-upgrade-rust-lldbcentos-upgrade-rust-srccentos-upgrade-rust-std-staticcentos-upgrade-rust-toolsetcentos-upgrade-rustfmtcentos-upgrade-rustfmt-debuginfo
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.