First published: Wed Apr 14 2021(Updated: )
In the standard library in Rust before 1.52.0, there is an optimization for joining strings that can cause uninitialized bytes to be exposed (or the program to crash) if the borrowed string changes after its length is checked.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Rust-lang Rust | <1.52.0 | |
Fedoraproject Fedora | =32 | |
Fedoraproject Fedora | =33 | |
Fedoraproject Fedora | =34 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-36323 is a vulnerability in the Rust standard library before version 1.52.0 that can cause uninitialized bytes to be exposed or the program to crash if the borrowed string changes after its length is checked.
CVE-2020-36323 affects Rust versions before 1.52.0 by introducing an optimization for joining strings that can lead to uninitialized bytes being exposed or potentially crashing the program.
CVE-2020-36323 has a severity rating of 8.2 (high).
To fix CVE-2020-36323, update Rust to version 1.52.0 or later.
Yes, you can find more information about CVE-2020-36323 at the following references: [GitHub Issue](https://github.com/rust-lang/rust/issues/80335), [Pull Request](https://github.com/rust-lang/rust/pull/81728), [Comment](https://github.com/rust-lang/rust/pull/81728#issuecomment-821549174).