First published: Sun Apr 11 2021(Updated: )
In the standard library in Rust before 1.50.0, read_to_end() does not validate the return value from Read in an unsafe context. This bug could lead to a buffer overflow.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Rust-lang Rust | <1.50.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-28875 is a vulnerability in Rust before version 1.50.0 that can lead to a buffer overflow due to read_to_end() not validating the return value from Read in an unsafe context.
The severity of CVE-2021-28875 is high with a severity value of 7.5.
CVE-2021-28875 affects Rust versions before 1.50.0 by potentially allowing a buffer overflow.
To fix CVE-2021-28875, update Rust to version 1.50.0 or newer.
Yes, you can find references for CVE-2021-28875 at the following links: [Reference 1](https://github.com/rust-lang/rust/issues/80894), [Reference 2](https://github.com/rust-lang/rust/pull/80895), [Reference 3](https://security.gentoo.org/glsa/202210-09).