Логотип exploitDog
bind:"CVE-2022-21658"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2022-21658"

Количество 20

Количество 20

ubuntu логотип

CVE-2022-21658

почти 4 года назад

Rust is a multi-paradigm, general-purpose programming language designed for performance and safety, especially safe concurrency. The Rust Security Response WG was notified that the `std::fs::remove_dir_all` standard library function is vulnerable a race condition enabling symlink following (CWE-363). An attacker could use this security issue to trick a privileged program into deleting files and directories the attacker couldn't otherwise access or delete. Rust 1.0.0 through Rust 1.58.0 is affected by this vulnerability with 1.58.1 containing a patch. Note that the following build targets don't have usable APIs to properly mitigate the attack, and are thus still vulnerable even with a patched toolchain: macOS before version 10.10 (Yosemite) and REDOX. We recommend everyone to update to Rust 1.58.1 as soon as possible, especially people developing programs expected to run in privileged contexts (including system daemons and setuid binaries), as those have the highest risk of being aff...

CVSS3: 7.3
EPSS: Низкий
redhat логотип

CVE-2022-21658

почти 4 года назад

Rust is a multi-paradigm, general-purpose programming language designed for performance and safety, especially safe concurrency. The Rust Security Response WG was notified that the `std::fs::remove_dir_all` standard library function is vulnerable a race condition enabling symlink following (CWE-363). An attacker could use this security issue to trick a privileged program into deleting files and directories the attacker couldn't otherwise access or delete. Rust 1.0.0 through Rust 1.58.0 is affected by this vulnerability with 1.58.1 containing a patch. Note that the following build targets don't have usable APIs to properly mitigate the attack, and are thus still vulnerable even with a patched toolchain: macOS before version 10.10 (Yosemite) and REDOX. We recommend everyone to update to Rust 1.58.1 as soon as possible, especially people developing programs expected to run in privileged contexts (including system daemons and setuid binaries), as those have the highest risk of being aff...

CVSS3: 5.3
EPSS: Низкий
nvd логотип

CVE-2022-21658

почти 4 года назад

Rust is a multi-paradigm, general-purpose programming language designed for performance and safety, especially safe concurrency. The Rust Security Response WG was notified that the `std::fs::remove_dir_all` standard library function is vulnerable a race condition enabling symlink following (CWE-363). An attacker could use this security issue to trick a privileged program into deleting files and directories the attacker couldn't otherwise access or delete. Rust 1.0.0 through Rust 1.58.0 is affected by this vulnerability with 1.58.1 containing a patch. Note that the following build targets don't have usable APIs to properly mitigate the attack, and are thus still vulnerable even with a patched toolchain: macOS before version 10.10 (Yosemite) and REDOX. We recommend everyone to update to Rust 1.58.1 as soon as possible, especially people developing programs expected to run in privileged contexts (including system daemons and setuid binaries), as those have the highest risk of being affect

CVSS3: 7.3
EPSS: Низкий
msrc логотип

CVE-2022-21658

почти 4 года назад

Race condition in std::fs::remove_dir_all in rustlang

CVSS3: 6.3
EPSS: Низкий
debian логотип

CVE-2022-21658

почти 4 года назад

Rust is a multi-paradigm, general-purpose programming language designe ...

CVSS3: 7.3
EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2022:0843-1

больше 3 лет назад

Security update for rust, rust1.58, rust1.59

EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2022:0491-1

почти 4 года назад

Security update for rust

EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2022:0175-1

почти 4 года назад

Security update for rust1.57

EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2022:0171-1

почти 4 года назад

Security update for rust1.55

EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2022:0149-1

почти 4 года назад

Security update for rust1.56

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2022:0843-1

больше 3 лет назад

Security update for rust, rust1.58, rust1.59

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2022:0491-1

почти 4 года назад

Security update for rust

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2022:0200-1

почти 4 года назад

Security update for rust

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2022:0175-1

почти 4 года назад

Security update for rust1.57

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2022:0171-1

почти 4 года назад

Security update for rust1.55

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2022:0149-1

почти 4 года назад

Security update for rust1.56

EPSS: Низкий
rocky логотип

RLSA-2022:1894

больше 3 лет назад

Moderate: rust-toolset:rhel8 security, bug fix, and enhancement update

EPSS: Низкий
oracle-oval логотип

ELSA-2022-1894

больше 3 лет назад

ELSA-2022-1894: rust-toolset:ol8 security, bug fix, and enhancement update (MODERATE)

EPSS: Низкий
fstec логотип

BDU:2022-05167

почти 4 года назад

Уязвимость функции std::fs::remove_dir_all языка программирования Rust, позволяющая нарушителю удалить произвольные системные файлы и каталоги

CVSS3: 9.8
EPSS: Низкий
redos логотип

ROS-20220804-01

больше 3 лет назад

Уязвимость в стандартной библиотеке языка Rust

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2022-21658

Rust is a multi-paradigm, general-purpose programming language designed for performance and safety, especially safe concurrency. The Rust Security Response WG was notified that the `std::fs::remove_dir_all` standard library function is vulnerable a race condition enabling symlink following (CWE-363). An attacker could use this security issue to trick a privileged program into deleting files and directories the attacker couldn't otherwise access or delete. Rust 1.0.0 through Rust 1.58.0 is affected by this vulnerability with 1.58.1 containing a patch. Note that the following build targets don't have usable APIs to properly mitigate the attack, and are thus still vulnerable even with a patched toolchain: macOS before version 10.10 (Yosemite) and REDOX. We recommend everyone to update to Rust 1.58.1 as soon as possible, especially people developing programs expected to run in privileged contexts (including system daemons and setuid binaries), as those have the highest risk of being aff...

CVSS3: 7.3
1%
Низкий
почти 4 года назад
redhat логотип
CVE-2022-21658

Rust is a multi-paradigm, general-purpose programming language designed for performance and safety, especially safe concurrency. The Rust Security Response WG was notified that the `std::fs::remove_dir_all` standard library function is vulnerable a race condition enabling symlink following (CWE-363). An attacker could use this security issue to trick a privileged program into deleting files and directories the attacker couldn't otherwise access or delete. Rust 1.0.0 through Rust 1.58.0 is affected by this vulnerability with 1.58.1 containing a patch. Note that the following build targets don't have usable APIs to properly mitigate the attack, and are thus still vulnerable even with a patched toolchain: macOS before version 10.10 (Yosemite) and REDOX. We recommend everyone to update to Rust 1.58.1 as soon as possible, especially people developing programs expected to run in privileged contexts (including system daemons and setuid binaries), as those have the highest risk of being aff...

CVSS3: 5.3
1%
Низкий
почти 4 года назад
nvd логотип
CVE-2022-21658

Rust is a multi-paradigm, general-purpose programming language designed for performance and safety, especially safe concurrency. The Rust Security Response WG was notified that the `std::fs::remove_dir_all` standard library function is vulnerable a race condition enabling symlink following (CWE-363). An attacker could use this security issue to trick a privileged program into deleting files and directories the attacker couldn't otherwise access or delete. Rust 1.0.0 through Rust 1.58.0 is affected by this vulnerability with 1.58.1 containing a patch. Note that the following build targets don't have usable APIs to properly mitigate the attack, and are thus still vulnerable even with a patched toolchain: macOS before version 10.10 (Yosemite) and REDOX. We recommend everyone to update to Rust 1.58.1 as soon as possible, especially people developing programs expected to run in privileged contexts (including system daemons and setuid binaries), as those have the highest risk of being affect

CVSS3: 7.3
1%
Низкий
почти 4 года назад
msrc логотип
CVE-2022-21658

Race condition in std::fs::remove_dir_all in rustlang

CVSS3: 6.3
1%
Низкий
почти 4 года назад
debian логотип
CVE-2022-21658

Rust is a multi-paradigm, general-purpose programming language designe ...

CVSS3: 7.3
1%
Низкий
почти 4 года назад
suse-cvrf логотип
openSUSE-SU-2022:0843-1

Security update for rust, rust1.58, rust1.59

1%
Низкий
больше 3 лет назад
suse-cvrf логотип
openSUSE-SU-2022:0491-1

Security update for rust

1%
Низкий
почти 4 года назад
suse-cvrf логотип
openSUSE-SU-2022:0175-1

Security update for rust1.57

1%
Низкий
почти 4 года назад
suse-cvrf логотип
openSUSE-SU-2022:0171-1

Security update for rust1.55

1%
Низкий
почти 4 года назад
suse-cvrf логотип
openSUSE-SU-2022:0149-1

Security update for rust1.56

1%
Низкий
почти 4 года назад
suse-cvrf логотип
SUSE-SU-2022:0843-1

Security update for rust, rust1.58, rust1.59

1%
Низкий
больше 3 лет назад
suse-cvrf логотип
SUSE-SU-2022:0491-1

Security update for rust

1%
Низкий
почти 4 года назад
suse-cvrf логотип
SUSE-SU-2022:0200-1

Security update for rust

1%
Низкий
почти 4 года назад
suse-cvrf логотип
SUSE-SU-2022:0175-1

Security update for rust1.57

1%
Низкий
почти 4 года назад
suse-cvrf логотип
SUSE-SU-2022:0171-1

Security update for rust1.55

1%
Низкий
почти 4 года назад
suse-cvrf логотип
SUSE-SU-2022:0149-1

Security update for rust1.56

1%
Низкий
почти 4 года назад
rocky логотип
RLSA-2022:1894

Moderate: rust-toolset:rhel8 security, bug fix, and enhancement update

1%
Низкий
больше 3 лет назад
oracle-oval логотип
ELSA-2022-1894

ELSA-2022-1894: rust-toolset:ol8 security, bug fix, and enhancement update (MODERATE)

больше 3 лет назад
fstec логотип
BDU:2022-05167

Уязвимость функции std::fs::remove_dir_all языка программирования Rust, позволяющая нарушителю удалить произвольные системные файлы и каталоги

CVSS3: 9.8
1%
Низкий
почти 4 года назад
redos логотип
ROS-20220804-01

Уязвимость в стандартной библиотеке языка Rust

1%
Низкий
больше 3 лет назад

Уязвимостей на страницу