Bug 1184589 (CVE-2020-36317)

Summary: VUL-0: CVE-2020-36317: rust:memory safety violation in String:retain()
Product: [Novell Products] SUSE Security Incidents Reporter: Robert Frohl <rfrohl>
Component: IncidentsAssignee: William Brown <william.brown>
Status: RESOLVED FIXED QA Contact: Security Team bot <security-team>
Severity: Normal    
Priority: P3 - Medium CC: smash_bz
Version: unspecified   
Target Milestone: ---   
Hardware: Other   
OS: Other   
URL: https://smash.suse.de/issue/281610/
Whiteboard: CVSSv3.1:SUSE:CVE-2020-36317:5.3:(AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)
Found By: Security Response Team Services Priority:
Business Priority: Blocker: ---
Marketing QA Status: --- IT Deployment: ---

Description Robert Frohl 2021-04-12 07:46:29 UTC
CVE-2020-36317

In the standard library in Rust before 1.49.0, String::retain() function has a
panic safety problem. It allows creation of a non-UTF-8 Rust string when the
provided closure panics. This bug could result in a memory safety violation when
other string APIs assume that UTF-8 encoding is used on the same string.

References:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-36317
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36317
https://github.com/rust-lang/rust/issues/78498
https://github.com/rust-lang/rust/pull/78499
Comment 1 Robert Frohl 2021-04-12 07:48:10 UTC
tracking as affected:

- SUSE:SLE-15:Update/rust
- SUSE:SLE-15-SP1:Update/rust

already fixed in
- openSUSE:Factory/rust
Comment 2 Robert Frohl 2022-01-21 12:51:22 UTC
does not affect any supported version anymore, closing