vulnerability

Oracle Linux: CVE-2020-36323: ELSA-2021-3063: rust-toolset:ol8 security, bug fix, and enhancement update (MODERATE)

Severity
6
CVSS
(AV:N/AC:L/Au:N/C:P/I:N/A:P)
Published
Dec 23, 2020
Added
Aug 12, 2021
Modified
Dec 3, 2025

Description

In the standard library in Rust before 1.52.0, there is an optimization for joining strings that can cause uninitialized bytes to be exposed (or the program to crash) if the borrowed string changes after its length is checked.

Solutions

oracle-linux-upgrade-cargooracle-linux-upgrade-cargo-docoracle-linux-upgrade-clippyoracle-linux-upgrade-rlsoracle-linux-upgrade-rustoracle-linux-upgrade-rust-analysisoracle-linux-upgrade-rust-debugger-commonoracle-linux-upgrade-rust-docoracle-linux-upgrade-rustfmtoracle-linux-upgrade-rust-gdboracle-linux-upgrade-rust-lldboracle-linux-upgrade-rust-srcoracle-linux-upgrade-rust-std-staticoracle-linux-upgrade-rust-toolset
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.