In the standard library in Rust before 1.51.0, read_to_end() does not validate the return value from Read in an unsafe context. This bug could lead to a buffer overflow. Reference: https://github.com/rust-lang/rust/issues/80894 Upstream patch: https://github.com/rust-lang/rust/pull/80895
Created rust tracking bugs for this issue: Affects: epel-7 [bug 1949196] Affects: fedora-all [bug 1949195]
This issue has been addressed in the following products: Red Hat Developer Tools Via RHSA-2021:3042 https://access.redhat.com/errata/RHSA-2021:3042
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2021-28875
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2021:3063 https://access.redhat.com/errata/RHSA-2021:3063