CVE-2020-36323
Alibaba Cloud Linux (Aliyun Linux) vulnerability analysis and mitigation

Overview

CVE-2020-36323 is a security vulnerability discovered in the Rust programming language's standard library affecting versions before 1.52.0. The vulnerability stems from an optimization in the string joining functionality that could potentially expose uninitialized bytes or cause program crashes if a borrowed string changes after its length is checked (NVD, MITRE).

Technical details

The vulnerability exists in the joingenericcopy function of the Rust standard library. The issue occurs when the borrow result is first used for length calculation, and then the user-provided slice is borrowed again for content copying. If the borrowed string changes between these operations, it can lead to exposure of uninitialized memory or program crashes. The vulnerability received a CVSS v3.1 base score of 8.2 (High), with attack vector: Network, attack complexity: Low, privileges required: None, user interaction: None, scope: Unchanged, confidentiality: Low, integrity: None, and availability: High (Ubuntu).

Impact

The vulnerability can result in exposure of uninitialized bytes in memory or cause program crashes. Because Rust is statically linked, affected applications need to be rebuilt to benefit from the fixes. The actual security implications depend on how these APIs are used in each particular case (Fedora).

Mitigation and workarounds

The vulnerability was fixed in Rust version 1.52.0. Users are advised to upgrade to this version or later. The fix was also backported to various Linux distributions including Fedora 32, 33, and 34 through security updates (Fedora).

Additional resources


SourceThis report was generated using AI

Related Alibaba Cloud Linux (Aliyun Linux) vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-59088HIGH8.6
  • Rocky LinuxRocky Linux
  • idm:DL1::ipa-selinux
NoYesNov 12, 2025
CVE-2025-52565HIGH8.4
  • cAdvisorcAdvisor
  • runc-debuginfo
NoYesNov 06, 2025
CVE-2025-11230HIGH7.5
  • HAProxyHAProxy
  • haproxy
NoYesNov 19, 2025
CVE-2025-52881HIGH7.3
  • cAdvisorcAdvisor
  • mesosphere-vsphere-csi
NoYesNov 06, 2025
CVE-2025-59089MEDIUM5.9
  • Rocky LinuxRocky Linux
  • python3-ipatests
NoYesNov 12, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management