In the standard library in Rust before 1.52.0, the Zip implementation calls __iterator_get_unchecked() more than once for the same index (under certain conditions) when next_back() and next() are used together. This bug could lead to a memory safety violation due to an unmet safety requirement for the TrustedRandomAccess trait.
References
Link | Resource |
---|---|
https://github.com/rust-lang/rust/issues/82291 | Exploit Issue Tracking Third Party Advisory |
https://github.com/rust-lang/rust/pull/82292 | Patch Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CZ337CM4GFJLRDFVQCGC7J25V65JXOG5/ | Mailing List Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TFUO3URYCO73D2Q4WYJBWAMJWGGVXQO4/ | Mailing List Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VZG65GUW6Z2CYOQHF7T3TB5CZKIX6ZJE/ | Mailing List Third Party Advisory |
https://security.gentoo.org/glsa/202210-09 | Third Party Advisory |
Information
Published : 2021-04-11 13:15
Updated : 2022-11-03 12:37
NVD link : CVE-2021-28878
Mitre link : CVE-2021-28878
JSON object : View
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
Products Affected
rust-lang
- rust
fedoraproject
- fedora