4.3
CVSSv2

CVE-2021-28876

Published: 11/04/2021 Updated: 07/11/2023
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
CVSS v3 Base Score: 5.3 | Impact Score: 1.4 | Exploitability Score: 3.9
VMScore: 383
Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N

Vulnerability Summary

In the standard library in Rust prior to 1.52.0, the Zip implementation has a panic safety issue. It calls __iterator_get_unchecked() more than once for the same index when the underlying iterator panics (in certain conditions). This bug could lead to a memory safety violation due to an unmet safety requirement for the TrustedRandomAccess trait.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

rust-lang rust

fedoraproject fedora 32

fedoraproject fedora 33

fedoraproject fedora 34

Vendor Advisories

Debian Bug report logs - #986803 CVE-2021-28875 CVE-2021-28876 CVE-2021-28877 CVE-2021-28878 CVE-2021-28879 CVE-2020-36317 CVE-2020-36318 Package: rustc; Maintainer for rustc is Debian Rust Maintainers <pkg-rust-maintainers@alioth-listsdebiannet>; Source for rustc is src:rustc (PTS, buildd, popcon) Reported by: Moritz Mueh ...
In the standard library in Rust before 1520, there is an optimization for joining strings that can cause uninitialized bytes to be exposed (or the program to crash) if the borrowed string changes after its length is checked (CVE-2020-36323) In the standard library in Rust before 1520, the Zip implementation has a panic safety issue It calls _ ...
In the standard library in Rust before 1520, the Zip implementation has a panic safety issue It calls __iterator_get_unchecked() more than once for the same index when the underlying iterator panics (in certain conditions) This bug could lead to a memory safety violation due to an unmet safety requirement for the TrustedRandomAccess trait ...