Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

rocky логотип

RLSA-2022:1894

Опубликовано: 10 мая 2022
Источник: rocky
Оценка: SEVERITY_MODERATE

Описание

Moderate: rust-toolset:rhel8 security, bug fix, and enhancement update

Rust Toolset provides the Rust programming language compiler rustc, the cargo build tool and dependency manager, and required libraries. The following packages have been upgraded to a later upstream version: rust (1.58.0). (BZ#2002883) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.

Затронутые продукты

  • Rocky Linux 8

НаименованиеАрхитектураРелизRPM
cargox86_641.module+el8.6.0+826+60f85975cargo-1.58.1-1.module+el8.6.0+826+60f85975.x86_64.rpm
cargo-docnoarch1.module+el8.6.0+826+60f85975cargo-doc-1.58.1-1.module+el8.6.0+826+60f85975.noarch.rpm
clippyx86_641.module+el8.6.0+826+60f85975clippy-1.58.1-1.module+el8.6.0+826+60f85975.x86_64.rpm
rlsx86_641.module+el8.6.0+826+60f85975rls-1.58.1-1.module+el8.6.0+826+60f85975.x86_64.rpm
rustx86_641.module+el8.6.0+826+60f85975rust-1.58.1-1.module+el8.6.0+826+60f85975.x86_64.rpm
rust-analysisx86_641.module+el8.6.0+826+60f85975rust-analysis-1.58.1-1.module+el8.6.0+826+60f85975.x86_64.rpm
rust-debugger-commonnoarch1.module+el8.6.0+826+60f85975rust-debugger-common-1.58.1-1.module+el8.6.0+826+60f85975.noarch.rpm
rust-docx86_641.module+el8.6.0+826+60f85975rust-doc-1.58.1-1.module+el8.6.0+826+60f85975.x86_64.rpm
rustfmtx86_641.module+el8.6.0+826+60f85975rustfmt-1.58.1-1.module+el8.6.0+826+60f85975.x86_64.rpm
rust-gdbnoarch1.module+el8.6.0+826+60f85975rust-gdb-1.58.1-1.module+el8.6.0+826+60f85975.noarch.rpm

Показывать по

Связанные CVE

Связанные уязвимости

CVSS3: 7.3
ubuntu
больше 3 лет назад

Rust is a multi-paradigm, general-purpose programming language designed for performance and safety, especially safe concurrency. The Rust Security Response WG was notified that the `std::fs::remove_dir_all` standard library function is vulnerable a race condition enabling symlink following (CWE-363). An attacker could use this security issue to trick a privileged program into deleting files and directories the attacker couldn't otherwise access or delete. Rust 1.0.0 through Rust 1.58.0 is affected by this vulnerability with 1.58.1 containing a patch. Note that the following build targets don't have usable APIs to properly mitigate the attack, and are thus still vulnerable even with a patched toolchain: macOS before version 10.10 (Yosemite) and REDOX. We recommend everyone to update to Rust 1.58.1 as soon as possible, especially people developing programs expected to run in privileged contexts (including system daemons and setuid binaries), as those have the highest risk of being aff...

CVSS3: 5.3
redhat
больше 3 лет назад

Rust is a multi-paradigm, general-purpose programming language designed for performance and safety, especially safe concurrency. The Rust Security Response WG was notified that the `std::fs::remove_dir_all` standard library function is vulnerable a race condition enabling symlink following (CWE-363). An attacker could use this security issue to trick a privileged program into deleting files and directories the attacker couldn't otherwise access or delete. Rust 1.0.0 through Rust 1.58.0 is affected by this vulnerability with 1.58.1 containing a patch. Note that the following build targets don't have usable APIs to properly mitigate the attack, and are thus still vulnerable even with a patched toolchain: macOS before version 10.10 (Yosemite) and REDOX. We recommend everyone to update to Rust 1.58.1 as soon as possible, especially people developing programs expected to run in privileged contexts (including system daemons and setuid binaries), as those have the highest risk of being aff...

CVSS3: 7.3
nvd
больше 3 лет назад

Rust is a multi-paradigm, general-purpose programming language designed for performance and safety, especially safe concurrency. The Rust Security Response WG was notified that the `std::fs::remove_dir_all` standard library function is vulnerable a race condition enabling symlink following (CWE-363). An attacker could use this security issue to trick a privileged program into deleting files and directories the attacker couldn't otherwise access or delete. Rust 1.0.0 through Rust 1.58.0 is affected by this vulnerability with 1.58.1 containing a patch. Note that the following build targets don't have usable APIs to properly mitigate the attack, and are thus still vulnerable even with a patched toolchain: macOS before version 10.10 (Yosemite) and REDOX. We recommend everyone to update to Rust 1.58.1 as soon as possible, especially people developing programs expected to run in privileged contexts (including system daemons and setuid binaries), as those have the highest risk of being affect

CVSS3: 7.3
debian
больше 3 лет назад

Rust is a multi-paradigm, general-purpose programming language designe ...

suse-cvrf
больше 3 лет назад

Security update for rust, rust1.58, rust1.59