Lucene search

K
mageiaGentoo FoundationMGASA-2022-0044
HistoryFeb 03, 2022 - 12:29 a.m.

Updated rust packages fix security vulnerability

2022-02-0300:29:30
Gentoo Foundation
advisories.mageia.org
20

6.3 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H

3.3 Low

CVSS2

Access Vector

LOCAL

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:L/AC:M/Au:N/C:N/I:P/A:P

0.001 Low

EPSS

Percentile

37.1%

This update provides Rust 1.57.0 as a feature and bugfix update. See the release notes for details. The ‘std::fs::remove_dir_all’ standard library function was vulnerable a race condition enabling symlink following (CWE-363). An attacker could use this security issue to trick a privileged program into deleting files and directories the attacker couldn’t otherwise access or delete (CVE-2022-21658). This vulnerability was fixed by patching Rust 1.57.0.

OSVersionArchitecturePackageVersionFilename
Mageia8noarchrust< 1.57.0-1.1rust-1.57.0-1.1.mga8

6.3 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H

3.3 Low

CVSS2

Access Vector

LOCAL

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:L/AC:M/Au:N/C:N/I:P/A:P

0.001 Low

EPSS

Percentile

37.1%