360 lines
19 KiB
XML
360 lines
19 KiB
XML
<?xml version="1.0" encoding="UTF-8"?>
|
|
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
|
|
<DocumentTitle xml:lang="en">An update for rust is now available for openEuler-20.03-LTS-SP1</DocumentTitle>
|
|
<DocumentType>Security Advisory</DocumentType>
|
|
<DocumentPublisher Type="Vendor">
|
|
<ContactDetails>openeuler-security@openeuler.org</ContactDetails>
|
|
<IssuingAuthority>openEuler security committee</IssuingAuthority>
|
|
</DocumentPublisher>
|
|
<DocumentTracking>
|
|
<Identification>
|
|
<ID>openEuler-SA-2021-1214</ID>
|
|
</Identification>
|
|
<Status>Final</Status>
|
|
<Version>1.0</Version>
|
|
<RevisionHistory>
|
|
<Revision>
|
|
<Number>1.0</Number>
|
|
<Date>2021-06-12</Date>
|
|
<Description>Initial</Description>
|
|
</Revision>
|
|
</RevisionHistory>
|
|
<InitialReleaseDate>2021-06-12</InitialReleaseDate>
|
|
<CurrentReleaseDate>2021-06-12</CurrentReleaseDate>
|
|
<Generator>
|
|
<Engine>openEuler SA Tool V1.0</Engine>
|
|
<Date>2021-06-12</Date>
|
|
</Generator>
|
|
</DocumentTracking>
|
|
<DocumentNotes>
|
|
<Note Title="Synopsis" Type="General" Ordinal="1" xml:lang="en">rust security update</Note>
|
|
<Note Title="Summary" Type="General" Ordinal="2" xml:lang="en">An update for rust is now available for openEuler-20.03-LTS-SP1.</Note>
|
|
<Note Title="Description" Type="General" Ordinal="3" xml:lang="en">Rust is a systems programming language that runs blazingly fast, prevents segfaults, and guarantees thread safety.
|
|
|
|
Security Fix(es):
|
|
|
|
In the standard library in Rust before 1.49.0, String::retain() function has a panic safety problem. It allows creation of a non-UTF-8 Rust string when the provided closure panics. This bug could result in a memory safety violation when other string APIs assume that UTF-8 encoding is used on the same string.(CVE-2020-36317)
|
|
|
|
In the standard library in Rust before 1.50.0, read_to_end() does not validate the return value from Read in an unsafe context. This bug could lead to a buffer overflow.(CVE-2021-28875)
|
|
|
|
In the standard library in Rust before 1.52.0, the Zip implementation calls __iterator_get_unchecked() more than once for the same index (under certain conditions) when next_back() and next() are used together. This bug could lead to a memory safety violation due to an unmet safety requirement for the TrustedRandomAccess trait.(CVE-2021-28878)
|
|
|
|
In the standard library in Rust before 1.51.0, the Zip implementation calls __iterator_get_unchecked() for the same index more than once when nested. This bug can lead to a memory safety violation due to an unmet safety requirement for the TrustedRandomAccess trait.(CVE-2021-28877)
|
|
|
|
In the standard library in Rust before 1.52.0, the Zip implementation has a panic safety issue. It calls __iterator_get_unchecked() more than once for the same index when the underlying iterator panics (in certain conditions). This bug could lead to a memory safety violation due to an unmet safety requirement for the TrustedRandomAccess trait.(CVE-2021-28876)
|
|
|
|
In the standard library in Rust before 1.52.0, the Zip implementation can report an incorrect size due to an integer overflow. This bug can lead to a buffer overflow when a consumed Zip iterator is used again.(CVE-2021-28879)
|
|
|
|
In the standard library in Rust before 1.49.0, VecDeque::make_contiguous has a bug that pops the same element more than once under certain condition. This bug could result in a use-after-free or double free.(CVE-2020-36318)
|
|
|
|
In the standard library in Rust before 1.52.0, there is an optimization for joining strings that can cause uninitialized bytes to be exposed (or the program to crash) if the borrowed string changes after its length is checked.(CVE-2020-36323)</Note>
|
|
<Note Title="Topic" Type="General" Ordinal="4" xml:lang="en">An update for rust is now available for openEuler-20.03-LTS-SP1.
|
|
|
|
openEuler Security has rated this update as having a security impact of critical. A Common Vunlnerability Scoring System(CVSS)base score,which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.</Note>
|
|
<Note Title="Severity" Type="General" Ordinal="5" xml:lang="en">Critical</Note>
|
|
<Note Title="Affected Component" Type="General" Ordinal="6" xml:lang="en">rust</Note>
|
|
</DocumentNotes>
|
|
<DocumentReferences>
|
|
<Reference Type="Self">
|
|
<URL>https://openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2021-1214</URL>
|
|
</Reference>
|
|
<Reference Type="openEuler CVE">
|
|
<URL>https://openeuler.org/en/security/cve/detail.html?id=CVE-2020-36317</URL>
|
|
<URL>https://openeuler.org/en/security/cve/detail.html?id=CVE-2021-28875</URL>
|
|
<URL>https://openeuler.org/en/security/cve/detail.html?id=CVE-2021-28878</URL>
|
|
<URL>https://openeuler.org/en/security/cve/detail.html?id=CVE-2021-28877</URL>
|
|
<URL>https://openeuler.org/en/security/cve/detail.html?id=CVE-2021-28876</URL>
|
|
<URL>https://openeuler.org/en/security/cve/detail.html?id=CVE-2021-28879</URL>
|
|
<URL>https://openeuler.org/en/security/cve/detail.html?id=CVE-2020-36318</URL>
|
|
<URL>https://openeuler.org/en/security/cve/detail.html?id=CVE-2020-36323</URL>
|
|
</Reference>
|
|
<Reference Type="Other">
|
|
<URL>https://nvd.nist.gov/vuln/detail/CVE-2020-36317</URL>
|
|
<URL>https://nvd.nist.gov/vuln/detail/CVE-2021-28875</URL>
|
|
<URL>https://nvd.nist.gov/vuln/detail/CVE-2021-28878</URL>
|
|
<URL>https://nvd.nist.gov/vuln/detail/CVE-2021-28877</URL>
|
|
<URL>https://nvd.nist.gov/vuln/detail/CVE-2021-28876</URL>
|
|
<URL>https://nvd.nist.gov/vuln/detail/CVE-2021-28879</URL>
|
|
<URL>https://nvd.nist.gov/vuln/detail/CVE-2020-36318</URL>
|
|
<URL>https://nvd.nist.gov/vuln/detail/CVE-2020-36323</URL>
|
|
</Reference>
|
|
</DocumentReferences>
|
|
<ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
|
|
<Branch Type="Product Name" Name="openEuler">
|
|
<FullProductName ProductID="openEuler-20.03-LTS-SP1" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">openEuler-20.03-LTS-SP1</FullProductName>
|
|
</Branch>
|
|
<Branch Type="Package Arch" Name="aarch64">
|
|
<FullProductName ProductID="cargo-1.51.0-1" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">cargo-1.51.0-1.oe1.aarch64.rpm</FullProductName>
|
|
<FullProductName ProductID="rust-debuginfo-1.51.0-1" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">rust-debuginfo-1.51.0-1.oe1.aarch64.rpm</FullProductName>
|
|
<FullProductName ProductID="rust-1.51.0-1" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">rust-1.51.0-1.oe1.aarch64.rpm</FullProductName>
|
|
<FullProductName ProductID="rls-1.51.0-1" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">rls-1.51.0-1.oe1.aarch64.rpm</FullProductName>
|
|
<FullProductName ProductID="rustfmt-1.51.0-1" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">rustfmt-1.51.0-1.oe1.aarch64.rpm</FullProductName>
|
|
<FullProductName ProductID="rust-std-static-1.51.0-1" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">rust-std-static-1.51.0-1.oe1.aarch64.rpm</FullProductName>
|
|
<FullProductName ProductID="rust-analysis-1.51.0-1" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">rust-analysis-1.51.0-1.oe1.aarch64.rpm</FullProductName>
|
|
<FullProductName ProductID="clippy-1.51.0-1" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">clippy-1.51.0-1.oe1.aarch64.rpm</FullProductName>
|
|
<FullProductName ProductID="rust-debugsource-1.51.0-1" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">rust-debugsource-1.51.0-1.oe1.aarch64.rpm</FullProductName>
|
|
<FullProductName ProductID="rust-help-1.51.0-1" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">rust-help-1.51.0-1.oe1.aarch64.rpm</FullProductName>
|
|
</Branch>
|
|
<Branch Type="Package Arch" Name="noarch">
|
|
<FullProductName ProductID="rust-debugger-common-1.51.0-1" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">rust-debugger-common-1.51.0-1.oe1.noarch.rpm</FullProductName>
|
|
<FullProductName ProductID="rust-lldb-1.51.0-1" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">rust-lldb-1.51.0-1.oe1.noarch.rpm</FullProductName>
|
|
<FullProductName ProductID="rust-gdb-1.51.0-1" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">rust-gdb-1.51.0-1.oe1.noarch.rpm</FullProductName>
|
|
<FullProductName ProductID="rust-src-1.51.0-1" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">rust-src-1.51.0-1.oe1.noarch.rpm</FullProductName>
|
|
</Branch>
|
|
<Branch Type="Package Arch" Name="src">
|
|
<FullProductName ProductID="rust-1.51.0-1" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">rust-1.51.0-1.oe1.src.rpm</FullProductName>
|
|
</Branch>
|
|
<Branch Type="Package Arch" Name="x86_64">
|
|
<FullProductName ProductID="rust-std-static-1.51.0-1" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">rust-std-static-1.51.0-1.oe1.x86_64.rpm</FullProductName>
|
|
<FullProductName ProductID="rust-1.51.0-1" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">rust-1.51.0-1.oe1.x86_64.rpm</FullProductName>
|
|
<FullProductName ProductID="rust-debuginfo-1.51.0-1" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">rust-debuginfo-1.51.0-1.oe1.x86_64.rpm</FullProductName>
|
|
<FullProductName ProductID="rust-debugsource-1.51.0-1" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">rust-debugsource-1.51.0-1.oe1.x86_64.rpm</FullProductName>
|
|
<FullProductName ProductID="rust-analysis-1.51.0-1" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">rust-analysis-1.51.0-1.oe1.x86_64.rpm</FullProductName>
|
|
<FullProductName ProductID="rustfmt-1.51.0-1" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">rustfmt-1.51.0-1.oe1.x86_64.rpm</FullProductName>
|
|
<FullProductName ProductID="cargo-1.51.0-1" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">cargo-1.51.0-1.oe1.x86_64.rpm</FullProductName>
|
|
<FullProductName ProductID="rls-1.51.0-1" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">rls-1.51.0-1.oe1.x86_64.rpm</FullProductName>
|
|
<FullProductName ProductID="clippy-1.51.0-1" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">clippy-1.51.0-1.oe1.x86_64.rpm</FullProductName>
|
|
<FullProductName ProductID="rust-help-1.51.0-1" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">rust-help-1.51.0-1.oe1.x86_64.rpm</FullProductName>
|
|
</Branch>
|
|
</ProductTree>
|
|
<Vulnerability Ordinal="1" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
|
|
<Notes>
|
|
<Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the standard library in Rust before 1.49.0, String::retain() function has a panic safety problem. It allows creation of a non-UTF-8 Rust string when the provided closure panics. This bug could result in a memory safety violation when other string APIs assume that UTF-8 encoding is used on the same string.</Note>
|
|
</Notes>
|
|
<ReleaseDate>2021-06-12</ReleaseDate>
|
|
<CVE>CVE-2020-36317</CVE>
|
|
<ProductStatuses>
|
|
<Status Type="Fixed">
|
|
<ProductID>openEuler-20.03-LTS-SP1</ProductID>
|
|
</Status>
|
|
</ProductStatuses>
|
|
<Threats>
|
|
<Threat Type="Impact">
|
|
<Description>High</Description>
|
|
</Threat>
|
|
</Threats>
|
|
<CVSSScoreSets>
|
|
<ScoreSet>
|
|
<BaseScore>7.5</BaseScore>
|
|
<Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</Vector>
|
|
</ScoreSet>
|
|
</CVSSScoreSets>
|
|
<Remediations>
|
|
<Remediation Type="Vendor Fix">
|
|
<Description>rust security update</Description>
|
|
<DATE>2021-06-12</DATE>
|
|
<URL>https://openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2021-1214</URL>
|
|
</Remediation>
|
|
</Remediations>
|
|
</Vulnerability>
|
|
<Vulnerability Ordinal="2" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
|
|
<Notes>
|
|
<Note Title="Vulnerability Description" Type="General" Ordinal="2" xml:lang="en">In the standard library in Rust before 1.50.0, read_to_end() does not validate the return value from Read in an unsafe context. This bug could lead to a buffer overflow.</Note>
|
|
</Notes>
|
|
<ReleaseDate>2021-06-12</ReleaseDate>
|
|
<CVE>CVE-2021-28875</CVE>
|
|
<ProductStatuses>
|
|
<Status Type="Fixed">
|
|
<ProductID>openEuler-20.03-LTS-SP1</ProductID>
|
|
</Status>
|
|
</ProductStatuses>
|
|
<Threats>
|
|
<Threat Type="Impact">
|
|
<Description>High</Description>
|
|
</Threat>
|
|
</Threats>
|
|
<CVSSScoreSets>
|
|
<ScoreSet>
|
|
<BaseScore>7.5</BaseScore>
|
|
<Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</Vector>
|
|
</ScoreSet>
|
|
</CVSSScoreSets>
|
|
<Remediations>
|
|
<Remediation Type="Vendor Fix">
|
|
<Description>rust security update</Description>
|
|
<DATE>2021-06-12</DATE>
|
|
<URL>https://openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2021-1214</URL>
|
|
</Remediation>
|
|
</Remediations>
|
|
</Vulnerability>
|
|
<Vulnerability Ordinal="3" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
|
|
<Notes>
|
|
<Note Title="Vulnerability Description" Type="General" Ordinal="3" xml:lang="en">In the standard library in Rust before 1.52.0, the Zip implementation calls __iterator_get_unchecked() more than once for the same index (under certain conditions) when next_back() and next() are used together. This bug could lead to a memory safety violation due to an unmet safety requirement for the TrustedRandomAccess trait.</Note>
|
|
</Notes>
|
|
<ReleaseDate>2021-06-12</ReleaseDate>
|
|
<CVE>CVE-2021-28878</CVE>
|
|
<ProductStatuses>
|
|
<Status Type="Fixed">
|
|
<ProductID>openEuler-20.03-LTS-SP1</ProductID>
|
|
</Status>
|
|
</ProductStatuses>
|
|
<Threats>
|
|
<Threat Type="Impact">
|
|
<Description>High</Description>
|
|
</Threat>
|
|
</Threats>
|
|
<CVSSScoreSets>
|
|
<ScoreSet>
|
|
<BaseScore>7.5</BaseScore>
|
|
<Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</Vector>
|
|
</ScoreSet>
|
|
</CVSSScoreSets>
|
|
<Remediations>
|
|
<Remediation Type="Vendor Fix">
|
|
<Description>rust security update</Description>
|
|
<DATE>2021-06-12</DATE>
|
|
<URL>https://openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2021-1214</URL>
|
|
</Remediation>
|
|
</Remediations>
|
|
</Vulnerability>
|
|
<Vulnerability Ordinal="4" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
|
|
<Notes>
|
|
<Note Title="Vulnerability Description" Type="General" Ordinal="4" xml:lang="en">In the standard library in Rust before 1.51.0, the Zip implementation calls __iterator_get_unchecked() for the same index more than once when nested. This bug can lead to a memory safety violation due to an unmet safety requirement for the TrustedRandomAccess trait.</Note>
|
|
</Notes>
|
|
<ReleaseDate>2021-06-12</ReleaseDate>
|
|
<CVE>CVE-2021-28877</CVE>
|
|
<ProductStatuses>
|
|
<Status Type="Fixed">
|
|
<ProductID>openEuler-20.03-LTS-SP1</ProductID>
|
|
</Status>
|
|
</ProductStatuses>
|
|
<Threats>
|
|
<Threat Type="Impact">
|
|
<Description>High</Description>
|
|
</Threat>
|
|
</Threats>
|
|
<CVSSScoreSets>
|
|
<ScoreSet>
|
|
<BaseScore>7.5</BaseScore>
|
|
<Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</Vector>
|
|
</ScoreSet>
|
|
</CVSSScoreSets>
|
|
<Remediations>
|
|
<Remediation Type="Vendor Fix">
|
|
<Description>rust security update</Description>
|
|
<DATE>2021-06-12</DATE>
|
|
<URL>https://openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2021-1214</URL>
|
|
</Remediation>
|
|
</Remediations>
|
|
</Vulnerability>
|
|
<Vulnerability Ordinal="5" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
|
|
<Notes>
|
|
<Note Title="Vulnerability Description" Type="General" Ordinal="5" xml:lang="en">In the standard library in Rust before 1.52.0, the Zip implementation has a panic safety issue. It calls __iterator_get_unchecked() more than once for the same index when the underlying iterator panics (in certain conditions). This bug could lead to a memory safety violation due to an unmet safety requirement for the TrustedRandomAccess trait.</Note>
|
|
</Notes>
|
|
<ReleaseDate>2021-06-12</ReleaseDate>
|
|
<CVE>CVE-2021-28876</CVE>
|
|
<ProductStatuses>
|
|
<Status Type="Fixed">
|
|
<ProductID>openEuler-20.03-LTS-SP1</ProductID>
|
|
</Status>
|
|
</ProductStatuses>
|
|
<Threats>
|
|
<Threat Type="Impact">
|
|
<Description>High</Description>
|
|
</Threat>
|
|
</Threats>
|
|
<CVSSScoreSets>
|
|
<ScoreSet>
|
|
<BaseScore>7.5</BaseScore>
|
|
<Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</Vector>
|
|
</ScoreSet>
|
|
</CVSSScoreSets>
|
|
<Remediations>
|
|
<Remediation Type="Vendor Fix">
|
|
<Description>rust security update</Description>
|
|
<DATE>2021-06-12</DATE>
|
|
<URL>https://openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2021-1214</URL>
|
|
</Remediation>
|
|
</Remediations>
|
|
</Vulnerability>
|
|
<Vulnerability Ordinal="6" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
|
|
<Notes>
|
|
<Note Title="Vulnerability Description" Type="General" Ordinal="6" xml:lang="en">In the standard library in Rust before 1.52.0, the Zip implementation can report an incorrect size due to an integer overflow. This bug can lead to a buffer overflow when a consumed Zip iterator is used again.</Note>
|
|
</Notes>
|
|
<ReleaseDate>2021-06-12</ReleaseDate>
|
|
<CVE>CVE-2021-28879</CVE>
|
|
<ProductStatuses>
|
|
<Status Type="Fixed">
|
|
<ProductID>openEuler-20.03-LTS-SP1</ProductID>
|
|
</Status>
|
|
</ProductStatuses>
|
|
<Threats>
|
|
<Threat Type="Impact">
|
|
<Description>Critical</Description>
|
|
</Threat>
|
|
</Threats>
|
|
<CVSSScoreSets>
|
|
<ScoreSet>
|
|
<BaseScore>9.8</BaseScore>
|
|
<Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</Vector>
|
|
</ScoreSet>
|
|
</CVSSScoreSets>
|
|
<Remediations>
|
|
<Remediation Type="Vendor Fix">
|
|
<Description>rust security update</Description>
|
|
<DATE>2021-06-12</DATE>
|
|
<URL>https://openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2021-1214</URL>
|
|
</Remediation>
|
|
</Remediations>
|
|
</Vulnerability>
|
|
<Vulnerability Ordinal="7" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
|
|
<Notes>
|
|
<Note Title="Vulnerability Description" Type="General" Ordinal="7" xml:lang="en">In the standard library in Rust before 1.49.0, VecDeque::make_contiguous has a bug that pops the same element more than once under certain condition. This bug could result in a use-after-free or double free.</Note>
|
|
</Notes>
|
|
<ReleaseDate>2021-06-12</ReleaseDate>
|
|
<CVE>CVE-2020-36318</CVE>
|
|
<ProductStatuses>
|
|
<Status Type="Fixed">
|
|
<ProductID>openEuler-20.03-LTS-SP1</ProductID>
|
|
</Status>
|
|
</ProductStatuses>
|
|
<Threats>
|
|
<Threat Type="Impact">
|
|
<Description>Critical</Description>
|
|
</Threat>
|
|
</Threats>
|
|
<CVSSScoreSets>
|
|
<ScoreSet>
|
|
<BaseScore>9.8</BaseScore>
|
|
<Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</Vector>
|
|
</ScoreSet>
|
|
</CVSSScoreSets>
|
|
<Remediations>
|
|
<Remediation Type="Vendor Fix">
|
|
<Description>rust security update</Description>
|
|
<DATE>2021-06-12</DATE>
|
|
<URL>https://openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2021-1214</URL>
|
|
</Remediation>
|
|
</Remediations>
|
|
</Vulnerability>
|
|
<Vulnerability Ordinal="8" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
|
|
<Notes>
|
|
<Note Title="Vulnerability Description" Type="General" Ordinal="8" xml:lang="en">In the standard library in Rust before 1.52.0, there is an optimization for joining strings that can cause uninitialized bytes to be exposed (or the program to crash) if the borrowed string changes after its length is checked.</Note>
|
|
</Notes>
|
|
<ReleaseDate>2021-06-12</ReleaseDate>
|
|
<CVE>CVE-2020-36323</CVE>
|
|
<ProductStatuses>
|
|
<Status Type="Fixed">
|
|
<ProductID>openEuler-20.03-LTS-SP1</ProductID>
|
|
</Status>
|
|
</ProductStatuses>
|
|
<Threats>
|
|
<Threat Type="Impact">
|
|
<Description>High</Description>
|
|
</Threat>
|
|
</Threats>
|
|
<CVSSScoreSets>
|
|
<ScoreSet>
|
|
<BaseScore>8.2</BaseScore>
|
|
<Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H</Vector>
|
|
</ScoreSet>
|
|
</CVSSScoreSets>
|
|
<Remediations>
|
|
<Remediation Type="Vendor Fix">
|
|
<Description>rust security update</Description>
|
|
<DATE>2021-06-12</DATE>
|
|
<URL>https://openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2021-1214</URL>
|
|
</Remediation>
|
|
</Remediations>
|
|
</Vulnerability>
|
|
</cvrfdoc> |