First published: Sun Apr 11 2021(Updated: )
In the standard library in Rust before 1.52.0, the Zip implementation calls __iterator_get_unchecked() more than once for the same index (under certain conditions) when next_back() and next() are used together. This bug could lead to a memory safety violation due to an unmet safety requirement for the TrustedRandomAccess trait.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Rust-lang Rust | <1.52.0 | |
Fedoraproject Fedora | =32 | |
Fedoraproject Fedora | =33 | |
Fedoraproject Fedora | =34 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-28878 is a vulnerability in the standard library in Rust before 1.52.0 that can lead to a memory safety violation.
CVE-2021-28878 has a severity rating of 7.5, which is considered high.
Rust versions before 1.52.0 and Fedora versions 32, 33, and 34 are affected by CVE-2021-28878.
To fix CVE-2021-28878, update Rust to version 1.52.0 or later.
You can find more information about CVE-2021-28878 in the references provided: https://github.com/rust-lang/rust/issues/82291, https://github.com/rust-lang/rust/pull/82292, https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CZ337CM4GFJLRDFVQCGC7J25V65JXOG5/