CVE-2020-36323
Severity
8.2HIGH
EPSS
0.7%
top 27.90%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedApr 14
Latest updateMay 24
Description
In the standard library in Rust before 1.52.0, there is an optimization for joining strings that can cause uninitialized bytes to be exposed (or the program to crash) if the borrowed string changes after its length is checked.
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:HExploitability: 3.9 | Impact: 4.2
Affected Packages2 packages
Also affects: Fedora 32, 33, 34
Patches
🔴Vulnerability Details
3📋Vendor Advisories
3Microsoft▶
In the standard library in Rust before 1.52.0 there is an optimization for joining strings that can cause uninitialized bytes to be exposed (or the program to crash) if the borrowed string changes aft↗2021-04-13
Red Hat
▶
Debian▶
CVE-2020-36323: rustc - In the standard library in Rust before 1.52.0, there is an optimization for join...↗2020