CVE Vulnerabilities

CVE-2021-28876

Improper Handling of Exceptional Conditions

Published: Apr 11, 2021 | Modified: Nov 07, 2023
CVSS 3.x
5.3
MEDIUM
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
CVSS 2.x
4.3 MEDIUM
AV:N/AC:M/Au:N/C:N/I:P/A:N
RedHat/V2
RedHat/V3
5.3 MODERATE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
Ubuntu
MEDIUM

In the standard library in Rust before 1.52.0, the Zip implementation has a panic safety issue. It calls __iterator_get_unchecked() more than once for the same index when the underlying iterator panics (in certain conditions). This bug could lead to a memory safety violation due to an unmet safety requirement for the TrustedRandomAccess trait.

Weakness

The product does not handle or incorrectly handles an exceptional condition.

Affected Software

Name Vendor Start Version End Version
Rust Rust-lang * 1.52.0 (excluding)
Red Hat Developer Tools RedHat rust-toolset-1.52-0:1.52.1-1.el7_9 *
Red Hat Developer Tools RedHat rust-toolset-1.52-rust-0:1.52.1-2.el7_9 *
Red Hat Enterprise Linux 8 RedHat rust-toolset:rhel8-8040020210603202531.2daa1a95 *
Rustc Ubuntu bionic *
Rustc Ubuntu esm-apps/xenial *
Rustc Ubuntu esm-infra-legacy/trusty *
Rustc Ubuntu focal *
Rustc Ubuntu groovy *
Rustc Ubuntu hirsute *
Rustc Ubuntu impish *
Rustc Ubuntu jammy *
Rustc Ubuntu kinetic *
Rustc Ubuntu trusty *
Rustc Ubuntu trusty/esm *
Rustc Ubuntu upstream *
Rustc Ubuntu xenial *

References