CVE-2021-28875
Severity
7.5HIGH
EPSS
0.4%
top 38.30%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedApr 11
Latest updateMay 24
Description
In the standard library in Rust before 1.50.0, read_to_end() does not validate the return value from Read in an unsafe context. This bug could lead to a buffer overflow.
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:HExploitability: 3.9 | Impact: 3.6
Affected Packages2 packages
Patches
🔴Vulnerability Details
3📋Vendor Advisories
3Microsoft▶
In the standard library in Rust before 1.50.0 read_to_end() does not validate the return value from Read in an unsafe context. This bug could lead to a buffer overflow.↗2021-04-13
Red Hat▶
rust: heap-based buffer overflow in read_to_end() because it does not validate the return value from Read in an unsafe context↗2021-01-10
Debian▶
CVE-2021-28875: rustc - In the standard library in Rust before 1.50.0, read_to_end() does not validate t...↗2021