mirror of
https://github.com/OMGeeky/advisory-db.git
synced 2025-12-30 08:13:58 +01:00
17 lines
483 B
Markdown
17 lines
483 B
Markdown
```toml
|
|
[advisory]
|
|
id = "CVE-2021-28875"
|
|
package = "std"
|
|
categories = ["memory-corruption"]
|
|
date = "2021-01-10"
|
|
url = "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28875"
|
|
|
|
[versions]
|
|
patched = [">= 1.50.0"]
|
|
unaffected = ["< 1.20.0"]
|
|
```
|
|
|
|
# Logic bug in Read can cause buffer overflow in read_to_end()
|
|
|
|
In the standard library in Rust before 1.50.0, read_to_end() does not validate the return value from Read in an unsafe context. This bug could lead to a buffer overflow.
|