6.4
CVSSv2

CVE-2020-36323

Published: 14/04/2021 Updated: 07/11/2023
CVSS v2 Base Score: 6.4 | Impact Score: 4.9 | Exploitability Score: 10
CVSS v3 Base Score: 8.2 | Impact Score: 4.2 | Exploitability Score: 3.9
VMScore: 570
Vector: AV:N/AC:L/Au:N/C:P/I:N/A:P

Vulnerability Summary

In the standard library in Rust prior to 1.52.0, there is an optimization for joining strings that can cause uninitialized bytes to be exposed (or the program to crash) if the borrowed string changes after its length is checked.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

rust-lang rust

fedoraproject fedora 32

fedoraproject fedora 33

fedoraproject fedora 34

Vendor Advisories

In the standard library in Rust before 1520, there is an optimization for joining strings that can cause uninitialized bytes to be exposed (or the program to crash) if the borrowed string changes after its length is checked (CVE-2020-36323) In the standard library in Rust before 1520, the Zip implementation has a panic safety issue It calls _ ...
In the standard library in Rust before 1503, there is an optimization for joining strings that can cause uninitialized bytes to be exposed (or the program to crash) if the borrowed string changes after its length is checked ...

Github Repositories

Rudra's artifact evaluation submission

Artifact Evaluation Submission for RUDRA [SOSP '21] Paper: RUDRA: Finding Memory Safety Bugs in Rust at the Ecosystem Scale Note: This document was written when Rudra was using nightly-2020-08-26 version of the Rust compiler Most of the parts should work with the latest version of Rudra, but some parts (eg, stdlib analysis) are tied to that version and you might need ru