CVE Vulnerabilities

CVE-2021-28876

Improper Handling of Exceptional Conditions

Published: Apr 11, 2021 | Modified: Nov 21, 2024
CVSS 3.x
5.3
MEDIUM
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
CVSS 2.x
4.3 MEDIUM
AV:N/AC:M/Au:N/C:N/I:P/A:N
RedHat/V2
RedHat/V3
5.3 MODERATE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

In the standard library in Rust before 1.52.0, the Zip implementation has a panic safety issue. It calls __iterator_get_unchecked() more than once for the same index when the underlying iterator panics (in certain conditions). This bug could lead to a memory safety violation due to an unmet safety requirement for the TrustedRandomAccess trait.

Weakness

The product does not handle or incorrectly handles an exceptional condition.

Affected Software

NameVendorStart VersionEnd Version
RustRust-lang*1.52.0 (excluding)
Red Hat Developer ToolsRedHatrust-toolset-1.52-0:1.52.1-1.el7_9*
Red Hat Developer ToolsRedHatrust-toolset-1.52-rust-0:1.52.1-2.el7_9*
Red Hat Enterprise Linux 8RedHatrust-toolset:rhel8-8040020210603202531.2daa1a95*
RustcUbuntubionic*
RustcUbuntuesm-apps/focal*
RustcUbuntuesm-apps/xenial*
RustcUbuntuesm-infra-legacy/trusty*
RustcUbuntufocal*
RustcUbuntugroovy*
RustcUbuntuhirsute*
RustcUbuntuimpish*
RustcUbuntujammy*
RustcUbuntukinetic*
RustcUbuntutrusty*
RustcUbuntutrusty/esm*
RustcUbuntuupstream*
RustcUbuntuxenial*

References