vulnerability

Red Hat: CVE-2021-28875: CVE-2021-28875 rust: heap-based buffer overflow in read_to_end() because it does not validate the return value from Read in an unsafe context (Multiple Advisories)

Severity
5
CVSS
(AV:N/AC:L/Au:N/C:N/I:N/A:P)
Published
Apr 11, 2021
Added
Aug 12, 2021
Modified
Aug 11, 2025

Description

In the standard library in Rust before 1.50.0, read_to_end() does not validate the return value from Read in an unsafe context. This bug could lead to a buffer overflow.

Solutions

redhat-upgrade-cargoredhat-upgrade-cargo-debuginforedhat-upgrade-cargo-docredhat-upgrade-clippyredhat-upgrade-clippy-debuginforedhat-upgrade-rlsredhat-upgrade-rls-debuginforedhat-upgrade-rustredhat-upgrade-rust-analysisredhat-upgrade-rust-debugger-commonredhat-upgrade-rust-debuginforedhat-upgrade-rust-debugsourceredhat-upgrade-rust-docredhat-upgrade-rust-gdbredhat-upgrade-rust-lldbredhat-upgrade-rust-srcredhat-upgrade-rust-std-staticredhat-upgrade-rust-toolsetredhat-upgrade-rustfmtredhat-upgrade-rustfmt-debuginfo
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.