9.8
CVSSv3

CVE-2021-28879

Published: 11/04/2021 Updated: 07/11/2023
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 668
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

In the standard library in Rust prior to 1.52.0, the Zip implementation can report an incorrect size due to an integer overflow. This bug can lead to a buffer overflow when a consumed Zip iterator is used again.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

rust-lang rust

fedoraproject fedora 32

fedoraproject fedora 33

fedoraproject fedora 34

Vendor Advisories

Debian Bug report logs - #986803 CVE-2021-28875 CVE-2021-28876 CVE-2021-28877 CVE-2021-28878 CVE-2021-28879 CVE-2020-36317 CVE-2020-36318 Package: rustc; Maintainer for rustc is Debian Rust Maintainers <pkg-rust-maintainers@alioth-listsdebiannet>; Source for rustc is src:rustc (PTS, buildd, popcon) Reported by: Moritz Mueh ...
In the standard library in Rust before 1520, there is an optimization for joining strings that can cause uninitialized bytes to be exposed (or the program to crash) if the borrowed string changes after its length is checked (CVE-2020-36323) In the standard library in Rust before 1520, the Zip implementation has a panic safety issue It calls _ ...
Severity Unknown Remote Unknown Type Unknown Description AVG-1801 rust 1510-1 Medium Vulnerable ...

Github Repositories

My writeup for PKU GeekGame 2nd

GeekGame 2nd Writeup by mariodon 签到 一开始做这道题时感觉有点懵,因为我这使用浏览器打开 pdf,再和去年一样 Ctrl + A Ctrl + C 就把 flag 复制出来了,还真以为出了一道和去年一样的签到题呢。 后来看问卷才注意到 pdf 开了禁止复制。 这个故事告诉我们,选择正确的工具还是很重要的,可以少