CVE-2021-28878

CWE-119Buffer Overflow7 documents7 sources
Severity
7.5HIGH
EPSS
1.0%
top 22.87%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedApr 11
Latest updateMay 24

Description

In the standard library in Rust before 1.52.0, the Zip implementation calls __iterator_get_unchecked() more than once for the same index (under certain conditions) when next_back() and next() are used together. This bug could lead to a memory safety violation due to an unmet safety requirement for the TrustedRandomAccess trait.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:HExploitability: 3.9 | Impact: 3.6

Affected Packages2 packages

NVDrust-lang/rust< 1.52.0
Debianrustc< 1.53.0+dfsg1-1+2

Also affects: Fedora 32, 33, 34

Patches

🔴Vulnerability Details

3
GHSA
GHSA-p39x-6cjx-6mpm: In the standard library in Rust before 12022-05-24
CVEList
CVE-2021-28878: In the standard library in Rust before 12021-04-11
OSV
CVE-2021-28878: In the standard library in Rust before 12021-04-11

📋Vendor Advisories

3
Microsoft
In the standard library in Rust before 1.52.0 the Zip implementation calls __iterator_get_unchecked() more than once for the same index (under certain conditions) when next_back() and next() are used 2021-04-13
Red Hat
rust: memory safety violation in Zip implementation when next_back() and next() are used together2021-03-07
Debian
CVE-2021-28878: rustc - In the standard library in Rust before 1.52.0, the Zip implementation calls __it...2021
CVE-2021-28878 (HIGH CVSS 7.5) | In the standard library in Rust bef | cvebase.io