Memory Safety Vulnerability in Rust Library Affecting String Handling
CVE-2020-36317
7.5HIGH
What is CVE-2020-36317?
The standard library in Rust prior to version 1.49.0 contains a memory safety issue in the String::retain() function, which can be triggered when the provided closure panics. This flaw may lead to the creation of a non-UTF-8 encoded string, raising concerns when other string APIs operate under the assumption of UTF-8 encoding. The potential ramifications of this vulnerability include memory safety violations, which can compromise the integrity of data handling in Rust applications.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.
Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.
References
CVSS V3.1
Score:
7.5
Severity:
HIGH
Confidentiality:
None
Integrity:
None
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved
