Описание
Security update for cargo-c
This update for cargo-c fixes the following issues:
- CVE-2025-4574: crossbeam-channel: Fixed double-free on drop in Channel::discard_all_messages (bsc#1243179)
- CVE-2025-58160: tracing-subscriber: Fixed log pollution (bsc#1249012)
- CVE-2024-12224: idna: Fixed improper validation of Punycode labels (bsc#1243851)
Other fixes:
- Fixed _service file to have proper versioning
- Update to version 0.10.15~git0.3e178d5:
- Bump actions/download-artifact from 4 to 5
- Update implib requirement from 0.3.5 to 0.4.0
- Add rlib to the targets when building tests
- Allow disabling emission of library version constants in header files
- Bump to cargo 0.90
- Fix static_libraries swallowing sequence of -framework flags
- Fix non-POSIX paths in Libdir under Windows
- Bump actions-rs-plus/clippy-check from 2.2.1 to 2.3.0
- Fix clippy lints
- Bump cargo-0.89, object-0.37.1, cbindgen-0.29
Список пакетов
openSUSE Leap 16.0
Ссылки
- SUSE Security Ratings
- SUSE Bug 1243179
- SUSE Bug 1243851
- SUSE Bug 1249012
- SUSE CVE CVE-2024-12224 page
- SUSE CVE CVE-2025-4574 page
- SUSE CVE CVE-2025-58160 page
Описание
Improper Validation of Unsafe Equivalence in punycode by the idna crate from Servo rust-url allows an attacker to create a punycode hostname that one part of a system might treat as distinct while another part of that system would treat as equivalent to another hostname.
Затронутые продукты
Ссылки
- CVE-2024-12224
- SUSE Bug 1243848
Описание
In crossbeam-channel rust crate, the internal `Channel` type's `Drop` method has a race condition which could, in some circumstances, lead to a double-free that could result in memory corruption.
Затронутые продукты
Ссылки
- CVE-2025-4574
- SUSE Bug 1243169
Описание
tracing is a framework for instrumenting Rust programs to collect structured, event-based diagnostic information. Prior to version 0.3.20, tracing-subscriber was vulnerable to ANSI escape sequence injection attacks. Untrusted user input containing ANSI escape sequences could be injected into terminal output when logged, potentially allowing attackers to manipulate terminal title bars, clear screens or modify terminal display, and potentially mislead users through terminal manipulation. tracing-subscriber version 0.3.20 fixes this vulnerability by escaping ANSI control characters when writing events to destinations that may be printed to the terminal. A workaround involves avoiding printing logs to terminal emulators without escaping ANSI control sequences.
Затронутые продукты
Ссылки
- CVE-2025-58160
- SUSE Bug 1249007