Bug 1184597 (CVE-2021-28875) - VUL-0: CVE-2021-28875: rust: potential buffer overflow in read_to_end()
Summary: VUL-0: CVE-2021-28875: rust: potential buffer overflow in read_to_end()
Status: RESOLVED FIXED
Alias: CVE-2021-28875
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: Other Other
: P3 - Medium : Minor
Target Milestone: ---
Assignee: William Brown
QA Contact: Security Team bot
URL: https://smash.suse.de/issue/281612/
Whiteboard: CVSSv3.1:SUSE:CVE-2021-28875:7.5:(AV:...
Keywords:
Depends on:
Blocks:
 
Reported: 2021-04-12 08:31 UTC by Robert Frohl
Modified: 2022-01-21 12:52 UTC (History)
1 user (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Robert Frohl 2021-04-12 08:31:33 UTC
CVE-2021-28875

In the standard library in Rust before 1.50.0, read_to_end() does not validate
the return value from Read in an unsafe context. This bug could lead to a buffer
overflow.

References:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-28875
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28875
https://github.com/rust-lang/rust/issues/80894
https://github.com/rust-lang/rust/pull/80895
Comment 1 Robert Frohl 2021-04-12 08:37:23 UTC
tracking as affected:

- SUSE:SLE-15:Update/rust
- SUSE:SLE-15-SP1:Update/rust

already fixed in
- openSUSE:Factory/rust
Comment 2 Robert Frohl 2022-01-21 12:52:36 UTC
also does not affect any supported version anymore, closing