Bug 1184589 (CVE-2020-36317) - VUL-0: CVE-2020-36317: rust:memory safety violation in String:retain()
Summary: VUL-0: CVE-2020-36317: rust:memory safety violation in String:retain()
Status: RESOLVED FIXED
Alias: CVE-2020-36317
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: Other Other
: P3 - Medium : Normal
Target Milestone: ---
Assignee: William Brown
QA Contact: Security Team bot
URL: https://smash.suse.de/issue/281610/
Whiteboard: CVSSv3.1:SUSE:CVE-2020-36317:5.3:(AV:...
Keywords:
Depends on:
Blocks:
 
Reported: 2021-04-12 07:46 UTC by Robert Frohl
Modified: 2022-01-21 12:51 UTC (History)
1 user (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Robert Frohl 2021-04-12 07:46:29 UTC
CVE-2020-36317

In the standard library in Rust before 1.49.0, String::retain() function has a
panic safety problem. It allows creation of a non-UTF-8 Rust string when the
provided closure panics. This bug could result in a memory safety violation when
other string APIs assume that UTF-8 encoding is used on the same string.

References:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-36317
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36317
https://github.com/rust-lang/rust/issues/78498
https://github.com/rust-lang/rust/pull/78499
Comment 1 Robert Frohl 2021-04-12 07:48:10 UTC
tracking as affected:

- SUSE:SLE-15:Update/rust
- SUSE:SLE-15-SP1:Update/rust

already fixed in
- openSUSE:Factory/rust
Comment 2 Robert Frohl 2022-01-21 12:51:22 UTC
does not affect any supported version anymore, closing