vulnerability
Red Hat: CVE-2020-36323: CVE-2020-36323 rust: optimization for joining strings can cause uninitialized bytes to be exposed (Multiple Advisories)
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 6 | (AV:N/AC:L/Au:N/C:P/I:N/A:P) | Apr 14, 2021 | Aug 12, 2021 | Aug 11, 2025 |
Severity
6
CVSS
(AV:N/AC:L/Au:N/C:P/I:N/A:P)
Published
Apr 14, 2021
Added
Aug 12, 2021
Modified
Aug 11, 2025
Description
In the standard library in Rust before 1.52.0, there is an optimization for joining strings that can cause uninitialized bytes to be exposed (or the program to crash) if the borrowed string changes after its length is checked.
Solutions
redhat-upgrade-cargoredhat-upgrade-cargo-debuginforedhat-upgrade-cargo-docredhat-upgrade-clippyredhat-upgrade-clippy-debuginforedhat-upgrade-rlsredhat-upgrade-rls-debuginforedhat-upgrade-rustredhat-upgrade-rust-analysisredhat-upgrade-rust-debugger-commonredhat-upgrade-rust-debuginforedhat-upgrade-rust-debugsourceredhat-upgrade-rust-docredhat-upgrade-rust-gdbredhat-upgrade-rust-lldbredhat-upgrade-rust-srcredhat-upgrade-rust-std-staticredhat-upgrade-rust-toolsetredhat-upgrade-rustfmtredhat-upgrade-rustfmt-debuginfo
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.