Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2022-21658 (GCVE-0-2022-21658)
Vulnerability from cvelistv5
Published
2022-01-20 00:00
Modified
2025-04-22 18:32
Severity ?
VLAI Severity ?
EPSS score ?
CWE
Summary
Rust is a multi-paradigm, general-purpose programming language designed for performance and safety, especially safe concurrency. The Rust Security Response WG was notified that the `std::fs::remove_dir_all` standard library function is vulnerable a race condition enabling symlink following (CWE-363). An attacker could use this security issue to trick a privileged program into deleting files and directories the attacker couldn't otherwise access or delete. Rust 1.0.0 through Rust 1.58.0 is affected by this vulnerability with 1.58.1 containing a patch. Note that the following build targets don't have usable APIs to properly mitigate the attack, and are thus still vulnerable even with a patched toolchain: macOS before version 10.10 (Yosemite) and REDOX. We recommend everyone to update to Rust 1.58.1 as soon as possible, especially people developing programs expected to run in privileged contexts (including system daemons and setuid binaries), as those have the highest risk of being affected by this. Note that adding checks in your codebase before calling remove_dir_all will not mitigate the vulnerability, as they would also be vulnerable to race conditions like remove_dir_all itself. The existing mitigation is working as intended outside of race conditions.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T02:46:39.244Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://github.com/rust-lang/rust/security/advisories/GHSA-r9cc-f5pr-p3j2" }, { "tags": [ "x_transferred" ], "url": "https://github.com/rust-lang/rust/pull/93110" }, { "tags": [ "x_transferred" ], "url": "https://github.com/rust-lang/rust/pull/93110/commits/32ed6e599bb4722efefd78bbc9cd7ec4613cb946" }, { "tags": [ "x_transferred" ], "url": "https://github.com/rust-lang/rust/pull/93110/commits/406cc071d6cfdfdb678bf3d83d766851de95abaf" }, { "tags": [ "x_transferred" ], "url": "https://github.com/rust-lang/rust/pull/93110/commits/4f0ad1c92ca08da6e8dc17838070975762f59714" }, { "tags": [ "x_transferred" ], "url": "https://blog.rust-lang.org/2022/01/20/cve-2022-21658.html" }, { "name": "FEDORA-2022-1bafa3fc91", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BK32QZLHDC2OVLPKTUHNT2G3VHWHD4LX/" }, { "name": "FEDORA-2022-2c73789458", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/C63NH72Q7UHJM5V3IVYRI7LVBGGFQMSQ/" }, { "name": "FEDORA-2022-1b76e3a192", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CKGTACKMKAPRDPWPTU26GYWBELIRFF5N/" }, { "name": "FEDORA-2022-06569a0a60", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7JKZDTBMGAWIFJSNWKBMPO5EAKRR4BEW/" }, { "tags": [ "x_transferred" ], "url": "https://support.apple.com/kb/HT213183" }, { "tags": [ "x_transferred" ], "url": "https://support.apple.com/kb/HT213182" }, { "tags": [ "x_transferred" ], "url": "https://support.apple.com/kb/HT213186" }, { "tags": [ "x_transferred" ], "url": "https://support.apple.com/kb/HT213193" }, { "name": "GLSA-202210-09", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://security.gentoo.org/glsa/202210-09" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2022-21658", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-04-22T15:52:12.198921Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-04-22T18:32:53.619Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "rust", "vendor": "rust-lang", "versions": [ { "status": "affected", "version": "\u003c 1.58.1" } ] } ], "descriptions": [ { "lang": "en", "value": "Rust is a multi-paradigm, general-purpose programming language designed for performance and safety, especially safe concurrency. The Rust Security Response WG was notified that the `std::fs::remove_dir_all` standard library function is vulnerable a race condition enabling symlink following (CWE-363). An attacker could use this security issue to trick a privileged program into deleting files and directories the attacker couldn\u0027t otherwise access or delete. Rust 1.0.0 through Rust 1.58.0 is affected by this vulnerability with 1.58.1 containing a patch. Note that the following build targets don\u0027t have usable APIs to properly mitigate the attack, and are thus still vulnerable even with a patched toolchain: macOS before version 10.10 (Yosemite) and REDOX. We recommend everyone to update to Rust 1.58.1 as soon as possible, especially people developing programs expected to run in privileged contexts (including system daemons and setuid binaries), as those have the highest risk of being affected by this. Note that adding checks in your codebase before calling remove_dir_all will not mitigate the vulnerability, as they would also be vulnerable to race conditions like remove_dir_all itself. The existing mitigation is working as intended outside of race conditions." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-363", "description": "CWE-363: Race Condition Enabling Link Following", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-367", "description": "CWE-367: Time-of-check Time-of-use (TOCTOU) Race Condition", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-10-16T00:00:00.000Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "url": "https://github.com/rust-lang/rust/security/advisories/GHSA-r9cc-f5pr-p3j2" }, { "url": "https://github.com/rust-lang/rust/pull/93110" }, { "url": "https://github.com/rust-lang/rust/pull/93110/commits/32ed6e599bb4722efefd78bbc9cd7ec4613cb946" }, { "url": "https://github.com/rust-lang/rust/pull/93110/commits/406cc071d6cfdfdb678bf3d83d766851de95abaf" }, { "url": "https://github.com/rust-lang/rust/pull/93110/commits/4f0ad1c92ca08da6e8dc17838070975762f59714" }, { "url": "https://blog.rust-lang.org/2022/01/20/cve-2022-21658.html" }, { "name": "FEDORA-2022-1bafa3fc91", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BK32QZLHDC2OVLPKTUHNT2G3VHWHD4LX/" }, { "name": "FEDORA-2022-2c73789458", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/C63NH72Q7UHJM5V3IVYRI7LVBGGFQMSQ/" }, { "name": "FEDORA-2022-1b76e3a192", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CKGTACKMKAPRDPWPTU26GYWBELIRFF5N/" }, { "name": "FEDORA-2022-06569a0a60", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7JKZDTBMGAWIFJSNWKBMPO5EAKRR4BEW/" }, { "url": "https://support.apple.com/kb/HT213183" }, { "url": "https://support.apple.com/kb/HT213182" }, { "url": "https://support.apple.com/kb/HT213186" }, { "url": "https://support.apple.com/kb/HT213193" }, { "name": "GLSA-202210-09", "tags": [ "vendor-advisory" ], "url": "https://security.gentoo.org/glsa/202210-09" } ], "source": { "advisory": "GHSA-r9cc-f5pr-p3j2", "discovery": "UNKNOWN" }, "title": "Race condition in std::fs::remove_dir_all in rustlang" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2022-21658", "datePublished": "2022-01-20T00:00:00.000Z", "dateReserved": "2021-11-16T00:00:00.000Z", "dateUpdated": "2025-04-22T18:32:53.619Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2022-21658\",\"sourceIdentifier\":\"security-advisories@github.com\",\"published\":\"2022-01-20T18:15:07.703\",\"lastModified\":\"2024-11-21T06:45:10.343\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Rust is a multi-paradigm, general-purpose programming language designed for performance and safety, especially safe concurrency. The Rust Security Response WG was notified that the `std::fs::remove_dir_all` standard library function is vulnerable a race condition enabling symlink following (CWE-363). An attacker could use this security issue to trick a privileged program into deleting files and directories the attacker couldn\u0027t otherwise access or delete. Rust 1.0.0 through Rust 1.58.0 is affected by this vulnerability with 1.58.1 containing a patch. Note that the following build targets don\u0027t have usable APIs to properly mitigate the attack, and are thus still vulnerable even with a patched toolchain: macOS before version 10.10 (Yosemite) and REDOX. We recommend everyone to update to Rust 1.58.1 as soon as possible, especially people developing programs expected to run in privileged contexts (including system daemons and setuid binaries), as those have the highest risk of being affected by this. Note that adding checks in your codebase before calling remove_dir_all will not mitigate the vulnerability, as they would also be vulnerable to race conditions like remove_dir_all itself. The existing mitigation is working as intended outside of race conditions.\"},{\"lang\":\"es\",\"value\":\"Rust es un lenguaje de programaci\u00f3n multiparadigma de prop\u00f3sito general dise\u00f1ado para el rendimiento y la seguridad, especialmente la concurrencia segura. El Grupo de Trabajo de Respuesta de Seguridad de Rust fue notificado de que la funci\u00f3n de la biblioteca est\u00e1ndar \\\"std::fs::remove_dir_all\\\" es vulnerable a una condici\u00f3n de carrera que permite el seguimiento de enlaces simb\u00f3licos (CWE-363). Un atacante podr\u00eda usar este problema de seguridad para enga\u00f1ar a un programa con privilegios para que elimine archivos y directorios a los que el atacante no podr\u00eda acceder o eliminar de otro modo. Rust versiones 1.0.0 hasta Rust versi\u00f3n 1.58.0 est\u00e1n afectados por esta vulnerabilidad, con la versi\u00f3n 1.58.1 que contiene un parche. Tenga en cuenta que los siguientes objetivos de construcci\u00f3n no presentan APIs usables para mitigar apropiadamente el ataque, y por lo tanto siguen siendo vulnerables incluso con una cadena de herramientas parcheada: macOS versiones anteriores a 10.10 (Yosemite) y REDOX. Recomendamos a todo el mundo que actualice a Rust versi\u00f3n 1.58.1 tan pronto como sea posible, especialmente a las personas que desarrollan programas que esperan que sean ejecutados en contextos privilegiados (incluidos los demonios del sistema y los binarios setuid), ya que son los que presentan el mayor riesgo de estar afectados por esto. Tenga en cuenta que a\u00f1adir comprobaciones en su c\u00f3digo base antes de llamar a remove_dir_all no mitigar\u00e1 la vulnerabilidad, ya que tambi\u00e9n ser\u00edan vulnerables a condiciones de carrera como el propio remove_dir_all. La mitigaci\u00f3n existente funciona como es pretendido fuera de las condiciones de carrera\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:H\",\"baseScore\":7.3,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.0,\"impactScore\":4.7},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H\",\"baseScore\":6.3,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.0,\"impactScore\":5.2}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:M/Au:N/C:N/I:P/A:P\",\"baseScore\":3.3,\"accessVector\":\"LOCAL\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"LOW\",\"exploitabilityScore\":3.4,\"impactScore\":4.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-363\"},{\"lang\":\"en\",\"value\":\"CWE-367\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-367\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rust-lang:rust:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.0.0\",\"versionEndIncluding\":\"1.58.0\",\"matchCriteriaId\":\"C1A1524F-CF05-4E2D-9A5B-B9A882DFF66D\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A930E247-0B43-43CB-98FF-6CE7B8189835\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"80E516C0-98A4-4ADE-B69F-66A772E2BAAA\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"15.4\",\"matchCriteriaId\":\"7A28B309-0018-46A4-A533-F10428F689B4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"15.4\",\"matchCriteriaId\":\"1E4C3F0C-E368-4F79-B42E-E5EB0FB5E767\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"12.0.0\",\"versionEndExcluding\":\"12.3\",\"matchCriteriaId\":\"9422A022-F279-4596-BC97-3223611D73DC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"15.4\",\"matchCriteriaId\":\"70A2E262-1C91-4030-A2D5-E089C271EA34\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"8.5\",\"matchCriteriaId\":\"17C8B971-2F25-4961-B1AF-F4AAB1848990\"}]}]}],\"references\":[{\"url\":\"https://blog.rust-lang.org/2022/01/20/cve-2022-21658.html\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Exploit\",\"Mitigation\",\"Vendor Advisory\"]},{\"url\":\"https://github.com/rust-lang/rust/pull/93110\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/rust-lang/rust/pull/93110/commits/32ed6e599bb4722efefd78bbc9cd7ec4613cb946\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/rust-lang/rust/pull/93110/commits/406cc071d6cfdfdb678bf3d83d766851de95abaf\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/rust-lang/rust/pull/93110/commits/4f0ad1c92ca08da6e8dc17838070975762f59714\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/rust-lang/rust/security/advisories/GHSA-r9cc-f5pr-p3j2\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Exploit\",\"Mitigation\",\"Third Party Advisory\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7JKZDTBMGAWIFJSNWKBMPO5EAKRR4BEW/\",\"source\":\"security-advisories@github.com\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BK32QZLHDC2OVLPKTUHNT2G3VHWHD4LX/\",\"source\":\"security-advisories@github.com\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/C63NH72Q7UHJM5V3IVYRI7LVBGGFQMSQ/\",\"source\":\"security-advisories@github.com\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CKGTACKMKAPRDPWPTU26GYWBELIRFF5N/\",\"source\":\"security-advisories@github.com\"},{\"url\":\"https://security.gentoo.org/glsa/202210-09\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://support.apple.com/kb/HT213182\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://support.apple.com/kb/HT213183\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://support.apple.com/kb/HT213186\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://support.apple.com/kb/HT213193\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://blog.rust-lang.org/2022/01/20/cve-2022-21658.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Mitigation\",\"Vendor Advisory\"]},{\"url\":\"https://github.com/rust-lang/rust/pull/93110\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/rust-lang/rust/pull/93110/commits/32ed6e599bb4722efefd78bbc9cd7ec4613cb946\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/rust-lang/rust/pull/93110/commits/406cc071d6cfdfdb678bf3d83d766851de95abaf\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/rust-lang/rust/pull/93110/commits/4f0ad1c92ca08da6e8dc17838070975762f59714\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/rust-lang/rust/security/advisories/GHSA-r9cc-f5pr-p3j2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Mitigation\",\"Third Party Advisory\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7JKZDTBMGAWIFJSNWKBMPO5EAKRR4BEW/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BK32QZLHDC2OVLPKTUHNT2G3VHWHD4LX/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/C63NH72Q7UHJM5V3IVYRI7LVBGGFQMSQ/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CKGTACKMKAPRDPWPTU26GYWBELIRFF5N/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://security.gentoo.org/glsa/202210-09\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://support.apple.com/kb/HT213182\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://support.apple.com/kb/HT213183\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://support.apple.com/kb/HT213186\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://support.apple.com/kb/HT213193\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]}]}}", "vulnrichment": { "containers": "{\"cna\": {\"title\": \"Race condition in std::fs::remove_dir_all in rustlang\", \"providerMetadata\": {\"orgId\": \"a0819718-46f1-4df5-94e2-005712e83aaa\", \"shortName\": \"GitHub_M\", \"dateUpdated\": \"2022-10-16T00:00:00.000Z\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"Rust is a multi-paradigm, general-purpose programming language designed for performance and safety, especially safe concurrency. The Rust Security Response WG was notified that the `std::fs::remove_dir_all` standard library function is vulnerable a race condition enabling symlink following (CWE-363). An attacker could use this security issue to trick a privileged program into deleting files and directories the attacker couldn\u0027t otherwise access or delete. Rust 1.0.0 through Rust 1.58.0 is affected by this vulnerability with 1.58.1 containing a patch. Note that the following build targets don\u0027t have usable APIs to properly mitigate the attack, and are thus still vulnerable even with a patched toolchain: macOS before version 10.10 (Yosemite) and REDOX. We recommend everyone to update to Rust 1.58.1 as soon as possible, especially people developing programs expected to run in privileged contexts (including system daemons and setuid binaries), as those have the highest risk of being affected by this. Note that adding checks in your codebase before calling remove_dir_all will not mitigate the vulnerability, as they would also be vulnerable to race conditions like remove_dir_all itself. The existing mitigation is working as intended outside of race conditions.\"}], \"affected\": [{\"vendor\": \"rust-lang\", \"product\": \"rust\", \"versions\": [{\"version\": \"\u003c 1.58.1\", \"status\": \"affected\"}]}], \"references\": [{\"url\": \"https://github.com/rust-lang/rust/security/advisories/GHSA-r9cc-f5pr-p3j2\"}, {\"url\": \"https://github.com/rust-lang/rust/pull/93110\"}, {\"url\": \"https://github.com/rust-lang/rust/pull/93110/commits/32ed6e599bb4722efefd78bbc9cd7ec4613cb946\"}, {\"url\": \"https://github.com/rust-lang/rust/pull/93110/commits/406cc071d6cfdfdb678bf3d83d766851de95abaf\"}, {\"url\": \"https://github.com/rust-lang/rust/pull/93110/commits/4f0ad1c92ca08da6e8dc17838070975762f59714\"}, {\"url\": \"https://blog.rust-lang.org/2022/01/20/cve-2022-21658.html\"}, {\"name\": \"FEDORA-2022-1bafa3fc91\", \"tags\": [\"vendor-advisory\"], \"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BK32QZLHDC2OVLPKTUHNT2G3VHWHD4LX/\"}, {\"name\": \"FEDORA-2022-2c73789458\", \"tags\": [\"vendor-advisory\"], \"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/C63NH72Q7UHJM5V3IVYRI7LVBGGFQMSQ/\"}, {\"name\": \"FEDORA-2022-1b76e3a192\", \"tags\": [\"vendor-advisory\"], \"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CKGTACKMKAPRDPWPTU26GYWBELIRFF5N/\"}, {\"name\": \"FEDORA-2022-06569a0a60\", \"tags\": [\"vendor-advisory\"], \"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7JKZDTBMGAWIFJSNWKBMPO5EAKRR4BEW/\"}, {\"url\": \"https://support.apple.com/kb/HT213183\"}, {\"url\": \"https://support.apple.com/kb/HT213182\"}, {\"url\": \"https://support.apple.com/kb/HT213186\"}, {\"url\": \"https://support.apple.com/kb/HT213193\"}, {\"name\": \"GLSA-202210-09\", \"tags\": [\"vendor-advisory\"], \"url\": \"https://security.gentoo.org/glsa/202210-09\"}], \"metrics\": [{\"cvssV3_1\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:H\", \"attackVector\": \"LOCAL\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"LOW\", \"userInteraction\": \"NONE\", \"scope\": \"CHANGED\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"baseScore\": 7.3, \"baseSeverity\": \"HIGH\"}}], \"problemTypes\": [{\"descriptions\": [{\"type\": \"CWE\", \"lang\": \"en\", \"description\": \"CWE-363: Race Condition Enabling Link Following\", \"cweId\": \"CWE-363\"}]}, {\"descriptions\": [{\"type\": \"CWE\", \"lang\": \"en\", \"description\": \"CWE-367: Time-of-check Time-of-use (TOCTOU) Race Condition\", \"cweId\": \"CWE-367\"}]}], \"source\": {\"advisory\": \"GHSA-r9cc-f5pr-p3j2\", \"discovery\": \"UNKNOWN\"}}, \"adp\": [{\"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-03T02:46:39.244Z\"}, \"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://github.com/rust-lang/rust/security/advisories/GHSA-r9cc-f5pr-p3j2\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://github.com/rust-lang/rust/pull/93110\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://github.com/rust-lang/rust/pull/93110/commits/32ed6e599bb4722efefd78bbc9cd7ec4613cb946\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://github.com/rust-lang/rust/pull/93110/commits/406cc071d6cfdfdb678bf3d83d766851de95abaf\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://github.com/rust-lang/rust/pull/93110/commits/4f0ad1c92ca08da6e8dc17838070975762f59714\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://blog.rust-lang.org/2022/01/20/cve-2022-21658.html\", \"tags\": [\"x_transferred\"]}, {\"name\": \"FEDORA-2022-1bafa3fc91\", \"tags\": [\"vendor-advisory\", \"x_transferred\"], \"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BK32QZLHDC2OVLPKTUHNT2G3VHWHD4LX/\"}, {\"name\": \"FEDORA-2022-2c73789458\", \"tags\": [\"vendor-advisory\", \"x_transferred\"], \"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/C63NH72Q7UHJM5V3IVYRI7LVBGGFQMSQ/\"}, {\"name\": \"FEDORA-2022-1b76e3a192\", \"tags\": [\"vendor-advisory\", \"x_transferred\"], \"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CKGTACKMKAPRDPWPTU26GYWBELIRFF5N/\"}, {\"name\": \"FEDORA-2022-06569a0a60\", \"tags\": [\"vendor-advisory\", \"x_transferred\"], \"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7JKZDTBMGAWIFJSNWKBMPO5EAKRR4BEW/\"}, {\"url\": \"https://support.apple.com/kb/HT213183\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://support.apple.com/kb/HT213182\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://support.apple.com/kb/HT213186\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://support.apple.com/kb/HT213193\", \"tags\": [\"x_transferred\"]}, {\"name\": \"GLSA-202210-09\", \"tags\": [\"vendor-advisory\", \"x_transferred\"], \"url\": \"https://security.gentoo.org/glsa/202210-09\"}]}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2022-21658\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"poc\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-04-22T15:52:12.198921Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-04-22T15:52:13.659Z\"}}]}", "cveMetadata": "{\"state\": \"PUBLISHED\", \"cveId\": \"CVE-2022-21658\", \"assignerOrgId\": \"a0819718-46f1-4df5-94e2-005712e83aaa\", \"assignerShortName\": \"GitHub_M\", \"dateUpdated\": \"2025-04-22T18:32:53.619Z\", \"dateReserved\": \"2021-11-16T00:00:00.000Z\", \"datePublished\": \"2022-01-20T00:00:00.000Z\"}", "dataType": "CVE_RECORD", "dataVersion": "5.1" } } }
opensuse-su-2022:0843-1
Vulnerability from csaf_opensuse
Published
2022-03-15 10:33
Modified
2022-03-15 10:33
Summary
Security update for rust, rust1.58, rust1.59
Notes
Title of the patch
Security update for rust, rust1.58, rust1.59
Description of the patch
This update for rust, rust1.58, rust1.59 fixes the following issues:
This update provides both rust1.58 and rust1.59.
Changes in rust1.58:
- Add recommends for GCC for installs to be able to link.
- Add suggests for lld/clang which are faster than gcc for linking to
allow users choice on what they use.
- CVE-2022-21658: Resolve race condition in std::fs::remove_dir_all (bsc#1194767)
Version 1.58.0 (2022-01-13)
==========================
Language
--------
- [Format strings can now capture arguments simply by writing `{ident}` in the string.][90473] This works in all macros accepting format strings. Support for this in `panic!` (`panic!('{ident}')`) requires the 2021 edition; panic invocations in previous editions that appear to be trying to use this will result in a warning lint about not having the intended effect.
- [`*const T` pointers can now be dereferenced in const contexts.][89551]
- [The rules for when a generic struct implements `Unsize` have been relaxed.][90417]
Compiler
--------
- [Add LLVM CFI support to the Rust compiler][89652]
- [Stabilize -Z strip as -C strip][90058]. Note that while release builds already don't add debug symbols for the code you compile, the compiled standard library that ships with Rust includes debug symbols, so you may want to use the `strip` option to remove these symbols to produce smaller release binaries. Note that this release only includes support in rustc, not directly in cargo.
- [Add support for LLVM coverage mapping format versions 5 and 6][91207]
- [Emit LLVM optimization remarks when enabled with `-Cremark`][90833]
- [Update the minimum external LLVM to 12][90175]
- [Add `x86_64-unknown-none` at Tier 3*][89062]
- [Build musl dist artifacts with debuginfo enabled][90733]. When building release binaries using musl, you may want to use the newly stabilized strip option to remove these debug symbols, reducing the size of your binaries.
- [Don't abort compilation after giving a lint error][87337]
- [Error messages point at the source of trait bound obligations in more places][89580]
\* Refer to Rust's [platform support page][platform-support-doc] for more
information on Rust's tiered platform support.
Libraries
---------
- [All remaining functions in the standard library have `#[must_use]` annotations where appropriate][89692], producing a warning when ignoring their return value. This helps catch mistakes such as expecting a function to mutate a value in place rather than return a new value.
- [Paths are automatically canonicalized on Windows for operations that support it][89174]
- [Re-enable debug checks for `copy` and `copy_nonoverlapping`][90041]
- [Implement `RefUnwindSafe` for `Rc<T>`][87467]
- [Make RSplit<T, P>: Clone not require T: Clone][90117]
- [Implement `Termination` for `Result<Infallible, E>`][88601]. This allows writing `fn main() -> Result<Infallible, ErrorType>`, for a program whose successful exits never involve returning from `main` (for instance, a program that calls `exit`, or that uses `exec` to run another program).
Stabilized APIs
---------------
- [`Metadata::is_symlink`]
- [`Path::is_symlink`]
- [`{integer}::saturating_div`]
- [`Option::unwrap_unchecked`]
- [`Result::unwrap_unchecked`]
- [`Result::unwrap_err_unchecked`]
- [`NonZero{unsigned}::is_power_of_two`]
- [`File::options`]
These APIs are now usable in const contexts:
- [`Duration::new`]
- [`Duration::checked_add`]
- [`Duration::saturating_add`]
- [`Duration::checked_sub`]
- [`Duration::saturating_sub`]
- [`Duration::checked_mul`]
- [`Duration::saturating_mul`]
- [`Duration::checked_div`]
- [`MaybeUninit::as_ptr`]
- [`MaybeUninit::as_mut_ptr`]
- [`MaybeUninit::assume_init`]
- [`MaybeUninit::assume_init_ref`]
Cargo
-----
- [Add --message-format for install command][cargo/10107]
- [Warn when alias shadows external subcommand][cargo/10082]
Rustdoc
-------
- [Show all Deref implementations recursively in rustdoc][90183]
- [Use computed visibility in rustdoc][88447]
Compatibility Notes
-------------------
- [Try all stable method candidates first before trying unstable ones][90329]. This change ensures that adding new nightly-only methods to the Rust standard library will not break code invoking methods of the same name from traits outside the standard library.
- Windows: [`std::process::Command` will no longer search the current directory for executables.][87704]
- [All proc-macro backward-compatibility lints are now deny-by-default.][88041]
- [proc_macro: Append .0 to unsuffixed float if it would otherwise become int token][90297]
- [Refactor weak symbols in std::sys::unix][90846]. This optimizes accesses to glibc functions, by avoiding the use of dlopen. This does not increase the [minimum expected version of glibc](https://doc.rust-lang.org/nightly/rustc/platform-support.html). However, software distributions that use symbol versions to detect library dependencies, and which take weak symbols into account in that analysis, may detect rust binaries as requiring newer versions of glibc.
- [rustdoc now rejects some unexpected semicolons in doctests][91026]
Version 1.59.0 (2022-02-24)
==========================
Language
--------
- [Stabilize default arguments for const generics][90207]
- [Stabilize destructuring assignment][90521]
- [Relax private in public lint on generic bounds and where clauses of trait impls][90586]
- [Stabilize asm! and global_asm! for x86, x86_64, ARM, Aarch64, and RISC-V][91728]
Compiler
--------
- [Stabilize new symbol mangling format, leaving it opt-in (-Csymbol-mangling-version=v0)][90128]
- [Emit LLVM optimization remarks when enabled with `-Cremark`][90833]
- [Fix sparc64 ABI for aggregates with floating point members][91003]
- [Warn when a `#[test]`-like built-in attribute macro is present multiple times.][91172]
- [Add support for riscv64gc-unknown-freebsd][91284]
- [Stabilize `-Z emit-future-incompat` as `--json future-incompat`][91535]
Libraries
---------
- [Remove unnecessary bounds for some Hash{Map,Set} methods][91593]
Stabilized APIs
---------------
- [`std::thread::available_parallelism`][available_parallelism]
- [`Result::copied`][result-copied]
- [`Result::cloned`][result-cloned]
- [`arch::asm!`][asm]
- [`arch::global_asm!`][global_asm]
- [`ops::ControlFlow::is_break`][is_break]
- [`ops::ControlFlow::is_continue`][is_continue]
- [`TryFrom<char> for u8`][try_from_char_u8]
- [`char::TryFromCharError`][try_from_char_err]
implementing `Clone`, `Debug`, `Display`, `PartialEq`, `Copy`, `Eq`, `Error`
- [`iter::zip`][zip]
- [`NonZeroU8::is_power_of_two`][is_power_of_two8]
- [`NonZeroU16::is_power_of_two`][is_power_of_two16]
- [`NonZeroU32::is_power_of_two`][is_power_of_two32]
- [`NonZeroU64::is_power_of_two`][is_power_of_two64]
- [`NonZeroU128::is_power_of_two`][is_power_of_two128]
- [`DoubleEndedIterator for ToLowercase`][lowercase]
- [`DoubleEndedIterator for ToUppercase`][uppercase]
- [`TryFrom<&mut [T]> for [T; N]`][tryfrom_ref_arr]
- [`UnwindSafe for Once`][unwindsafe_once]
- [`RefUnwindSafe for Once`][refunwindsafe_once]
- [armv8 neon intrinsics for aarch64][stdarch/1266]
Const-stable:
- [`mem::MaybeUninit::as_ptr`][muninit_ptr]
- [`mem::MaybeUninit::assume_init`][muninit_init]
- [`mem::MaybeUninit::assume_init_ref`][muninit_init_ref]
- [`ffi::CStr::from_bytes_with_nul_unchecked`][cstr_from_bytes]
Cargo
-----
- [Stabilize the `strip` profile option][cargo/10088]
- [Stabilize future-incompat-report][cargo/10165]
- [Support abbreviating `--release` as `-r`][cargo/10133]
- [Support `term.quiet` configuration][cargo/10152]
- [Remove `--host` from cargo {publish,search,login}][cargo/10145]
Compatibility Notes
-------------------
- [Refactor weak symbols in std::sys::unix][90846]
This may add new, versioned, symbols when building with a newer glibc, as the
standard library uses weak linkage rather than dynamically attempting to load
certain symbols at runtime.
- [Deprecate crate_type and crate_name nested inside `#![cfg_attr]`][83744]
This adds a future compatibility lint to supporting the use of cfg_attr
wrapping either crate_type or crate_name specification within Rust files;
it is recommended that users migrate to setting the equivalent command line
flags.
- [Remove effect of `#[no_link]` attribute on name resolution][92034]
This may expose new names, leading to conflicts with preexisting names in a
given namespace and a compilation failure.
- [Cargo will document libraries before binaries.][cargo/10172]
- [Respect doc=false in dependencies, not just the root crate][cargo/10201]
- [Weaken guarantee around advancing underlying iterators in zip][83791]
- [Make split_inclusive() on an empty slice yield an empty output][89825]
- [Update std::env::temp_dir to use GetTempPath2 on Windows when available.][89999]
Changes in rust wrapper package:
- Update to version 1.59.0 - for details see the rust1.59 package
- Update package description to help users choose what tooling
to install.
- Provide rust+cargo by cargo: all cargo<n> package provide this
symbol too. Having the meta package provide it allows OBS to have
a generic prefernece on the meta package for all packages 'just'
requiring rust+cargo.
- Update to version 1.58.0
Patchnames
openSUSE-SLE-15.3-2022-843,openSUSE-SLE-15.4-2022-843
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for rust, rust1.58, rust1.59", "title": "Title of the patch" }, { "category": "description", "text": "This update for rust, rust1.58, rust1.59 fixes the following issues:\n\nThis update provides both rust1.58 and rust1.59.\n\nChanges in rust1.58:\n\n- Add recommends for GCC for installs to be able to link.\n- Add suggests for lld/clang which are faster than gcc for linking to\n allow users choice on what they use.\n- CVE-2022-21658: Resolve race condition in std::fs::remove_dir_all (bsc#1194767)\n\nVersion 1.58.0 (2022-01-13)\n==========================\n\nLanguage\n--------\n- [Format strings can now capture arguments simply by writing `{ident}` in the string.][90473] This works in all macros accepting format strings. Support for this in `panic!` (`panic!(\u0027{ident}\u0027)`) requires the 2021 edition; panic invocations in previous editions that appear to be trying to use this will result in a warning lint about not having the intended effect.\n- [`*const T` pointers can now be dereferenced in const contexts.][89551]\n- [The rules for when a generic struct implements `Unsize` have been relaxed.][90417]\nCompiler\n--------\n- [Add LLVM CFI support to the Rust compiler][89652]\n- [Stabilize -Z strip as -C strip][90058]. Note that while release builds already don\u0027t add debug symbols for the code you compile, the compiled standard library that ships with Rust includes debug symbols, so you may want to use the `strip` option to remove these symbols to produce smaller release binaries. Note that this release only includes support in rustc, not directly in cargo.\n- [Add support for LLVM coverage mapping format versions 5 and 6][91207]\n- [Emit LLVM optimization remarks when enabled with `-Cremark`][90833]\n- [Update the minimum external LLVM to 12][90175]\n- [Add `x86_64-unknown-none` at Tier 3*][89062]\n- [Build musl dist artifacts with debuginfo enabled][90733]. When building release binaries using musl, you may want to use the newly stabilized strip option to remove these debug symbols, reducing the size of your binaries.\n- [Don\u0027t abort compilation after giving a lint error][87337]\n- [Error messages point at the source of trait bound obligations in more places][89580]\n\\* Refer to Rust\u0027s [platform support page][platform-support-doc] for more\n information on Rust\u0027s tiered platform support.\n\nLibraries\n---------\n\n- [All remaining functions in the standard library have `#[must_use]` annotations where appropriate][89692], producing a warning when ignoring their return value. This helps catch mistakes such as expecting a function to mutate a value in place rather than return a new value.\n- [Paths are automatically canonicalized on Windows for operations that support it][89174]\n- [Re-enable debug checks for `copy` and `copy_nonoverlapping`][90041]\n- [Implement `RefUnwindSafe` for `Rc\u003cT\u003e`][87467]\n- [Make RSplit\u003cT, P\u003e: Clone not require T: Clone][90117]\n- [Implement `Termination` for `Result\u003cInfallible, E\u003e`][88601]. This allows writing `fn main() -\u003e Result\u003cInfallible, ErrorType\u003e`, for a program whose successful exits never involve returning from `main` (for instance, a program that calls `exit`, or that uses `exec` to run another program).\n\nStabilized APIs\n---------------\n\n- [`Metadata::is_symlink`]\n- [`Path::is_symlink`]\n- [`{integer}::saturating_div`]\n- [`Option::unwrap_unchecked`]\n- [`Result::unwrap_unchecked`]\n- [`Result::unwrap_err_unchecked`]\n- [`NonZero{unsigned}::is_power_of_two`]\n- [`File::options`]\nThese APIs are now usable in const contexts:\n- [`Duration::new`]\n- [`Duration::checked_add`]\n- [`Duration::saturating_add`]\n- [`Duration::checked_sub`]\n- [`Duration::saturating_sub`]\n- [`Duration::checked_mul`]\n- [`Duration::saturating_mul`]\n- [`Duration::checked_div`]\n- [`MaybeUninit::as_ptr`]\n- [`MaybeUninit::as_mut_ptr`]\n- [`MaybeUninit::assume_init`]\n- [`MaybeUninit::assume_init_ref`]\n\nCargo\n-----\n\n- [Add --message-format for install command][cargo/10107]\n- [Warn when alias shadows external subcommand][cargo/10082]\n\nRustdoc\n-------\n\n- [Show all Deref implementations recursively in rustdoc][90183]\n- [Use computed visibility in rustdoc][88447]\n\nCompatibility Notes\n-------------------\n\n- [Try all stable method candidates first before trying unstable ones][90329]. This change ensures that adding new nightly-only methods to the Rust standard library will not break code invoking methods of the same name from traits outside the standard library.\n- Windows: [`std::process::Command` will no longer search the current directory for executables.][87704]\n- [All proc-macro backward-compatibility lints are now deny-by-default.][88041]\n- [proc_macro: Append .0 to unsuffixed float if it would otherwise become int token][90297]\n- [Refactor weak symbols in std::sys::unix][90846]. This optimizes accesses to glibc functions, by avoiding the use of dlopen. This does not increase the [minimum expected version of glibc](https://doc.rust-lang.org/nightly/rustc/platform-support.html). However, software distributions that use symbol versions to detect library dependencies, and which take weak symbols into account in that analysis, may detect rust binaries as requiring newer versions of glibc.\n- [rustdoc now rejects some unexpected semicolons in doctests][91026]\n\nVersion 1.59.0 (2022-02-24)\n==========================\n\nLanguage\n--------\n\n- [Stabilize default arguments for const generics][90207]\n- [Stabilize destructuring assignment][90521]\n- [Relax private in public lint on generic bounds and where clauses of trait impls][90586]\n- [Stabilize asm! and global_asm! for x86, x86_64, ARM, Aarch64, and RISC-V][91728]\n\nCompiler\n--------\n\n- [Stabilize new symbol mangling format, leaving it opt-in (-Csymbol-mangling-version=v0)][90128]\n- [Emit LLVM optimization remarks when enabled with `-Cremark`][90833]\n- [Fix sparc64 ABI for aggregates with floating point members][91003]\n- [Warn when a `#[test]`-like built-in attribute macro is present multiple times.][91172]\n- [Add support for riscv64gc-unknown-freebsd][91284]\n- [Stabilize `-Z emit-future-incompat` as `--json future-incompat`][91535]\n\nLibraries\n---------\n\n- [Remove unnecessary bounds for some Hash{Map,Set} methods][91593]\n\nStabilized APIs\n---------------\n\n- [`std::thread::available_parallelism`][available_parallelism]\n- [`Result::copied`][result-copied]\n- [`Result::cloned`][result-cloned]\n- [`arch::asm!`][asm]\n- [`arch::global_asm!`][global_asm]\n- [`ops::ControlFlow::is_break`][is_break]\n- [`ops::ControlFlow::is_continue`][is_continue]\n- [`TryFrom\u003cchar\u003e for u8`][try_from_char_u8]\n- [`char::TryFromCharError`][try_from_char_err]\n implementing `Clone`, `Debug`, `Display`, `PartialEq`, `Copy`, `Eq`, `Error`\n- [`iter::zip`][zip]\n- [`NonZeroU8::is_power_of_two`][is_power_of_two8]\n- [`NonZeroU16::is_power_of_two`][is_power_of_two16]\n- [`NonZeroU32::is_power_of_two`][is_power_of_two32]\n- [`NonZeroU64::is_power_of_two`][is_power_of_two64]\n- [`NonZeroU128::is_power_of_two`][is_power_of_two128]\n- [`DoubleEndedIterator for ToLowercase`][lowercase]\n- [`DoubleEndedIterator for ToUppercase`][uppercase]\n- [`TryFrom\u003c\u0026mut [T]\u003e for [T; N]`][tryfrom_ref_arr]\n- [`UnwindSafe for Once`][unwindsafe_once]\n- [`RefUnwindSafe for Once`][refunwindsafe_once]\n- [armv8 neon intrinsics for aarch64][stdarch/1266]\nConst-stable:\n- [`mem::MaybeUninit::as_ptr`][muninit_ptr]\n- [`mem::MaybeUninit::assume_init`][muninit_init]\n- [`mem::MaybeUninit::assume_init_ref`][muninit_init_ref]\n- [`ffi::CStr::from_bytes_with_nul_unchecked`][cstr_from_bytes]\n\nCargo\n-----\n\n- [Stabilize the `strip` profile option][cargo/10088]\n- [Stabilize future-incompat-report][cargo/10165]\n- [Support abbreviating `--release` as `-r`][cargo/10133]\n- [Support `term.quiet` configuration][cargo/10152]\n- [Remove `--host` from cargo {publish,search,login}][cargo/10145]\n\nCompatibility Notes\n-------------------\n\n- [Refactor weak symbols in std::sys::unix][90846]\n This may add new, versioned, symbols when building with a newer glibc, as the\n standard library uses weak linkage rather than dynamically attempting to load\n certain symbols at runtime.\n- [Deprecate crate_type and crate_name nested inside `#![cfg_attr]`][83744]\n This adds a future compatibility lint to supporting the use of cfg_attr\n wrapping either crate_type or crate_name specification within Rust files;\n it is recommended that users migrate to setting the equivalent command line\n flags.\n- [Remove effect of `#[no_link]` attribute on name resolution][92034]\n This may expose new names, leading to conflicts with preexisting names in a\n given namespace and a compilation failure.\n- [Cargo will document libraries before binaries.][cargo/10172]\n- [Respect doc=false in dependencies, not just the root crate][cargo/10201]\n- [Weaken guarantee around advancing underlying iterators in zip][83791]\n- [Make split_inclusive() on an empty slice yield an empty output][89825]\n- [Update std::env::temp_dir to use GetTempPath2 on Windows when available.][89999]\n\nChanges in rust wrapper package:\n\n- Update to version 1.59.0 - for details see the rust1.59 package\n\n- Update package description to help users choose what tooling\n to install.\n\n- Provide rust+cargo by cargo: all cargo\u003cn\u003e package provide this\n symbol too. Having the meta package provide it allows OBS to have\n a generic prefernece on the meta package for all packages \u0027just\u0027\n requiring rust+cargo.\n\n- Update to version 1.58.0\n", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-SLE-15.3-2022-843,openSUSE-SLE-15.4-2022-843", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2022_0843-1.json" }, { "category": "self", "summary": "URL for openSUSE-SU-2022:0843-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZODX3XK3LNWUDIGOVAOXXYOTCRZZ4CMJ/" }, { "category": "self", "summary": "E-Mail link for openSUSE-SU-2022:0843-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZODX3XK3LNWUDIGOVAOXXYOTCRZZ4CMJ/" }, { "category": "self", "summary": "SUSE Bug 1194767", "url": "https://bugzilla.suse.com/1194767" }, { "category": "self", "summary": "SUSE CVE CVE-2022-21658 page", "url": "https://www.suse.com/security/cve/CVE-2022-21658/" } ], "title": "Security update for rust, rust1.58, rust1.59", "tracking": { "current_release_date": "2022-03-15T10:33:50Z", "generator": { "date": "2022-03-15T10:33:50Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2022:0843-1", "initial_release_date": "2022-03-15T10:33:50Z", "revision_history": [ { "date": "2022-03-15T10:33:50Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "cargo-1.59.0-150300.21.20.1.aarch64", "product": { "name": "cargo-1.59.0-150300.21.20.1.aarch64", "product_id": "cargo-1.59.0-150300.21.20.1.aarch64" } }, { "category": "product_version", "name": "cargo1.58-1.58.0-150300.7.3.1.aarch64", "product": { "name": "cargo1.58-1.58.0-150300.7.3.1.aarch64", "product_id": "cargo1.58-1.58.0-150300.7.3.1.aarch64" } }, { "category": "product_version", "name": "cargo1.59-1.59.0-150300.7.4.2.aarch64", "product": { "name": "cargo1.59-1.59.0-150300.7.4.2.aarch64", "product_id": "cargo1.59-1.59.0-150300.7.4.2.aarch64" } }, { "category": "product_version", "name": "rust-1.59.0-150300.21.20.1.aarch64", "product": { "name": "rust-1.59.0-150300.21.20.1.aarch64", "product_id": "rust-1.59.0-150300.21.20.1.aarch64" } }, { "category": "product_version", "name": "rust1.58-1.58.0-150300.7.3.1.aarch64", "product": { "name": "rust1.58-1.58.0-150300.7.3.1.aarch64", "product_id": "rust1.58-1.58.0-150300.7.3.1.aarch64" } }, { "category": "product_version", "name": "rust1.59-1.59.0-150300.7.4.2.aarch64", "product": { "name": "rust1.59-1.59.0-150300.7.4.2.aarch64", "product_id": "rust1.59-1.59.0-150300.7.4.2.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "cargo-1.59.0-150300.21.20.1.ppc64le", "product": { "name": "cargo-1.59.0-150300.21.20.1.ppc64le", "product_id": "cargo-1.59.0-150300.21.20.1.ppc64le" } }, { "category": "product_version", "name": "cargo1.58-1.58.0-150300.7.3.1.ppc64le", "product": { "name": "cargo1.58-1.58.0-150300.7.3.1.ppc64le", "product_id": "cargo1.58-1.58.0-150300.7.3.1.ppc64le" } }, { "category": "product_version", "name": "cargo1.59-1.59.0-150300.7.4.2.ppc64le", "product": { "name": "cargo1.59-1.59.0-150300.7.4.2.ppc64le", "product_id": "cargo1.59-1.59.0-150300.7.4.2.ppc64le" } }, { "category": "product_version", "name": "rust-1.59.0-150300.21.20.1.ppc64le", "product": { "name": "rust-1.59.0-150300.21.20.1.ppc64le", "product_id": "rust-1.59.0-150300.21.20.1.ppc64le" } }, { "category": "product_version", "name": "rust1.58-1.58.0-150300.7.3.1.ppc64le", "product": { "name": "rust1.58-1.58.0-150300.7.3.1.ppc64le", "product_id": "rust1.58-1.58.0-150300.7.3.1.ppc64le" } }, { "category": "product_version", "name": "rust1.59-1.59.0-150300.7.4.2.ppc64le", "product": { "name": "rust1.59-1.59.0-150300.7.4.2.ppc64le", "product_id": "rust1.59-1.59.0-150300.7.4.2.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "cargo-1.59.0-150300.21.20.1.s390x", "product": { "name": "cargo-1.59.0-150300.21.20.1.s390x", "product_id": "cargo-1.59.0-150300.21.20.1.s390x" } }, { "category": "product_version", "name": "cargo1.58-1.58.0-150300.7.3.1.s390x", "product": { "name": "cargo1.58-1.58.0-150300.7.3.1.s390x", "product_id": "cargo1.58-1.58.0-150300.7.3.1.s390x" } }, { "category": "product_version", "name": "cargo1.59-1.59.0-150300.7.4.2.s390x", "product": { "name": "cargo1.59-1.59.0-150300.7.4.2.s390x", "product_id": "cargo1.59-1.59.0-150300.7.4.2.s390x" } }, { "category": "product_version", "name": "rust-1.59.0-150300.21.20.1.s390x", "product": { "name": "rust-1.59.0-150300.21.20.1.s390x", "product_id": "rust-1.59.0-150300.21.20.1.s390x" } }, { "category": "product_version", "name": "rust1.58-1.58.0-150300.7.3.1.s390x", "product": { "name": "rust1.58-1.58.0-150300.7.3.1.s390x", "product_id": "rust1.58-1.58.0-150300.7.3.1.s390x" } }, { "category": "product_version", "name": "rust1.59-1.59.0-150300.7.4.2.s390x", "product": { "name": "rust1.59-1.59.0-150300.7.4.2.s390x", "product_id": "rust1.59-1.59.0-150300.7.4.2.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "cargo-1.59.0-150300.21.20.1.x86_64", "product": { "name": "cargo-1.59.0-150300.21.20.1.x86_64", "product_id": "cargo-1.59.0-150300.21.20.1.x86_64" } }, { "category": "product_version", "name": "cargo1.58-1.58.0-150300.7.3.1.x86_64", "product": { "name": "cargo1.58-1.58.0-150300.7.3.1.x86_64", "product_id": "cargo1.58-1.58.0-150300.7.3.1.x86_64" } }, { "category": "product_version", "name": "cargo1.59-1.59.0-150300.7.4.2.x86_64", "product": { "name": "cargo1.59-1.59.0-150300.7.4.2.x86_64", "product_id": "cargo1.59-1.59.0-150300.7.4.2.x86_64" } }, { "category": "product_version", "name": "rust-1.59.0-150300.21.20.1.x86_64", "product": { "name": "rust-1.59.0-150300.21.20.1.x86_64", "product_id": "rust-1.59.0-150300.21.20.1.x86_64" } }, { "category": "product_version", "name": "rust1.58-1.58.0-150300.7.3.1.x86_64", "product": { "name": "rust1.58-1.58.0-150300.7.3.1.x86_64", "product_id": "rust1.58-1.58.0-150300.7.3.1.x86_64" } }, { "category": "product_version", "name": "rust1.59-1.59.0-150300.7.4.2.x86_64", "product": { "name": "rust1.59-1.59.0-150300.7.4.2.x86_64", "product_id": "rust1.59-1.59.0-150300.7.4.2.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Leap 15.3", "product": { "name": "openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3", "product_identification_helper": { "cpe": "cpe:/o:opensuse:leap:15.3" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "cargo-1.59.0-150300.21.20.1.aarch64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:cargo-1.59.0-150300.21.20.1.aarch64" }, "product_reference": "cargo-1.59.0-150300.21.20.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "cargo-1.59.0-150300.21.20.1.ppc64le as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:cargo-1.59.0-150300.21.20.1.ppc64le" }, "product_reference": "cargo-1.59.0-150300.21.20.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "cargo-1.59.0-150300.21.20.1.s390x as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:cargo-1.59.0-150300.21.20.1.s390x" }, "product_reference": "cargo-1.59.0-150300.21.20.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "cargo-1.59.0-150300.21.20.1.x86_64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:cargo-1.59.0-150300.21.20.1.x86_64" }, "product_reference": "cargo-1.59.0-150300.21.20.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "cargo1.58-1.58.0-150300.7.3.1.aarch64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:cargo1.58-1.58.0-150300.7.3.1.aarch64" }, "product_reference": "cargo1.58-1.58.0-150300.7.3.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "cargo1.58-1.58.0-150300.7.3.1.ppc64le as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:cargo1.58-1.58.0-150300.7.3.1.ppc64le" }, "product_reference": "cargo1.58-1.58.0-150300.7.3.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "cargo1.58-1.58.0-150300.7.3.1.s390x as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:cargo1.58-1.58.0-150300.7.3.1.s390x" }, "product_reference": "cargo1.58-1.58.0-150300.7.3.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "cargo1.58-1.58.0-150300.7.3.1.x86_64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:cargo1.58-1.58.0-150300.7.3.1.x86_64" }, "product_reference": "cargo1.58-1.58.0-150300.7.3.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "cargo1.59-1.59.0-150300.7.4.2.aarch64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:cargo1.59-1.59.0-150300.7.4.2.aarch64" }, "product_reference": "cargo1.59-1.59.0-150300.7.4.2.aarch64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "cargo1.59-1.59.0-150300.7.4.2.ppc64le as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:cargo1.59-1.59.0-150300.7.4.2.ppc64le" }, "product_reference": "cargo1.59-1.59.0-150300.7.4.2.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "cargo1.59-1.59.0-150300.7.4.2.s390x as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:cargo1.59-1.59.0-150300.7.4.2.s390x" }, "product_reference": "cargo1.59-1.59.0-150300.7.4.2.s390x", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "cargo1.59-1.59.0-150300.7.4.2.x86_64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:cargo1.59-1.59.0-150300.7.4.2.x86_64" }, "product_reference": "cargo1.59-1.59.0-150300.7.4.2.x86_64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "rust-1.59.0-150300.21.20.1.aarch64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:rust-1.59.0-150300.21.20.1.aarch64" }, "product_reference": "rust-1.59.0-150300.21.20.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "rust-1.59.0-150300.21.20.1.ppc64le as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:rust-1.59.0-150300.21.20.1.ppc64le" }, "product_reference": "rust-1.59.0-150300.21.20.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "rust-1.59.0-150300.21.20.1.s390x as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:rust-1.59.0-150300.21.20.1.s390x" }, "product_reference": "rust-1.59.0-150300.21.20.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "rust-1.59.0-150300.21.20.1.x86_64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:rust-1.59.0-150300.21.20.1.x86_64" }, "product_reference": "rust-1.59.0-150300.21.20.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "rust1.58-1.58.0-150300.7.3.1.aarch64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:rust1.58-1.58.0-150300.7.3.1.aarch64" }, "product_reference": "rust1.58-1.58.0-150300.7.3.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "rust1.58-1.58.0-150300.7.3.1.ppc64le as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:rust1.58-1.58.0-150300.7.3.1.ppc64le" }, "product_reference": "rust1.58-1.58.0-150300.7.3.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "rust1.58-1.58.0-150300.7.3.1.s390x as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:rust1.58-1.58.0-150300.7.3.1.s390x" }, "product_reference": "rust1.58-1.58.0-150300.7.3.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "rust1.58-1.58.0-150300.7.3.1.x86_64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:rust1.58-1.58.0-150300.7.3.1.x86_64" }, "product_reference": "rust1.58-1.58.0-150300.7.3.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "rust1.59-1.59.0-150300.7.4.2.aarch64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:rust1.59-1.59.0-150300.7.4.2.aarch64" }, "product_reference": "rust1.59-1.59.0-150300.7.4.2.aarch64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "rust1.59-1.59.0-150300.7.4.2.ppc64le as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:rust1.59-1.59.0-150300.7.4.2.ppc64le" }, "product_reference": "rust1.59-1.59.0-150300.7.4.2.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "rust1.59-1.59.0-150300.7.4.2.s390x as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:rust1.59-1.59.0-150300.7.4.2.s390x" }, "product_reference": "rust1.59-1.59.0-150300.7.4.2.s390x", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "rust1.59-1.59.0-150300.7.4.2.x86_64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:rust1.59-1.59.0-150300.7.4.2.x86_64" }, "product_reference": "rust1.59-1.59.0-150300.7.4.2.x86_64", "relates_to_product_reference": "openSUSE Leap 15.3" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-21658", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-21658" } ], "notes": [ { "category": "general", "text": "Rust is a multi-paradigm, general-purpose programming language designed for performance and safety, especially safe concurrency. The Rust Security Response WG was notified that the `std::fs::remove_dir_all` standard library function is vulnerable a race condition enabling symlink following (CWE-363). An attacker could use this security issue to trick a privileged program into deleting files and directories the attacker couldn\u0027t otherwise access or delete. Rust 1.0.0 through Rust 1.58.0 is affected by this vulnerability with 1.58.1 containing a patch. Note that the following build targets don\u0027t have usable APIs to properly mitigate the attack, and are thus still vulnerable even with a patched toolchain: macOS before version 10.10 (Yosemite) and REDOX. We recommend everyone to update to Rust 1.58.1 as soon as possible, especially people developing programs expected to run in privileged contexts (including system daemons and setuid binaries), as those have the highest risk of being affected by this. Note that adding checks in your codebase before calling remove_dir_all will not mitigate the vulnerability, as they would also be vulnerable to race conditions like remove_dir_all itself. The existing mitigation is working as intended outside of race conditions.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.3:cargo-1.59.0-150300.21.20.1.aarch64", "openSUSE Leap 15.3:cargo-1.59.0-150300.21.20.1.ppc64le", "openSUSE Leap 15.3:cargo-1.59.0-150300.21.20.1.s390x", "openSUSE Leap 15.3:cargo-1.59.0-150300.21.20.1.x86_64", "openSUSE Leap 15.3:cargo1.58-1.58.0-150300.7.3.1.aarch64", "openSUSE Leap 15.3:cargo1.58-1.58.0-150300.7.3.1.ppc64le", "openSUSE Leap 15.3:cargo1.58-1.58.0-150300.7.3.1.s390x", "openSUSE Leap 15.3:cargo1.58-1.58.0-150300.7.3.1.x86_64", "openSUSE Leap 15.3:cargo1.59-1.59.0-150300.7.4.2.aarch64", "openSUSE Leap 15.3:cargo1.59-1.59.0-150300.7.4.2.ppc64le", "openSUSE Leap 15.3:cargo1.59-1.59.0-150300.7.4.2.s390x", "openSUSE Leap 15.3:cargo1.59-1.59.0-150300.7.4.2.x86_64", "openSUSE Leap 15.3:rust-1.59.0-150300.21.20.1.aarch64", "openSUSE Leap 15.3:rust-1.59.0-150300.21.20.1.ppc64le", "openSUSE Leap 15.3:rust-1.59.0-150300.21.20.1.s390x", "openSUSE Leap 15.3:rust-1.59.0-150300.21.20.1.x86_64", "openSUSE Leap 15.3:rust1.58-1.58.0-150300.7.3.1.aarch64", "openSUSE Leap 15.3:rust1.58-1.58.0-150300.7.3.1.ppc64le", "openSUSE Leap 15.3:rust1.58-1.58.0-150300.7.3.1.s390x", "openSUSE Leap 15.3:rust1.58-1.58.0-150300.7.3.1.x86_64", "openSUSE Leap 15.3:rust1.59-1.59.0-150300.7.4.2.aarch64", "openSUSE Leap 15.3:rust1.59-1.59.0-150300.7.4.2.ppc64le", "openSUSE Leap 15.3:rust1.59-1.59.0-150300.7.4.2.s390x", "openSUSE Leap 15.3:rust1.59-1.59.0-150300.7.4.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-21658", "url": "https://www.suse.com/security/cve/CVE-2022-21658" }, { "category": "external", "summary": "SUSE Bug 1194767 for CVE-2022-21658", "url": "https://bugzilla.suse.com/1194767" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.3:cargo-1.59.0-150300.21.20.1.aarch64", "openSUSE Leap 15.3:cargo-1.59.0-150300.21.20.1.ppc64le", "openSUSE Leap 15.3:cargo-1.59.0-150300.21.20.1.s390x", "openSUSE Leap 15.3:cargo-1.59.0-150300.21.20.1.x86_64", "openSUSE Leap 15.3:cargo1.58-1.58.0-150300.7.3.1.aarch64", "openSUSE Leap 15.3:cargo1.58-1.58.0-150300.7.3.1.ppc64le", "openSUSE Leap 15.3:cargo1.58-1.58.0-150300.7.3.1.s390x", "openSUSE Leap 15.3:cargo1.58-1.58.0-150300.7.3.1.x86_64", "openSUSE Leap 15.3:cargo1.59-1.59.0-150300.7.4.2.aarch64", "openSUSE Leap 15.3:cargo1.59-1.59.0-150300.7.4.2.ppc64le", "openSUSE Leap 15.3:cargo1.59-1.59.0-150300.7.4.2.s390x", "openSUSE Leap 15.3:cargo1.59-1.59.0-150300.7.4.2.x86_64", "openSUSE Leap 15.3:rust-1.59.0-150300.21.20.1.aarch64", "openSUSE Leap 15.3:rust-1.59.0-150300.21.20.1.ppc64le", "openSUSE Leap 15.3:rust-1.59.0-150300.21.20.1.s390x", "openSUSE Leap 15.3:rust-1.59.0-150300.21.20.1.x86_64", "openSUSE Leap 15.3:rust1.58-1.58.0-150300.7.3.1.aarch64", "openSUSE Leap 15.3:rust1.58-1.58.0-150300.7.3.1.ppc64le", "openSUSE Leap 15.3:rust1.58-1.58.0-150300.7.3.1.s390x", "openSUSE Leap 15.3:rust1.58-1.58.0-150300.7.3.1.x86_64", "openSUSE Leap 15.3:rust1.59-1.59.0-150300.7.4.2.aarch64", "openSUSE Leap 15.3:rust1.59-1.59.0-150300.7.4.2.ppc64le", "openSUSE Leap 15.3:rust1.59-1.59.0-150300.7.4.2.s390x", "openSUSE Leap 15.3:rust1.59-1.59.0-150300.7.4.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "openSUSE Leap 15.3:cargo-1.59.0-150300.21.20.1.aarch64", "openSUSE Leap 15.3:cargo-1.59.0-150300.21.20.1.ppc64le", "openSUSE Leap 15.3:cargo-1.59.0-150300.21.20.1.s390x", "openSUSE Leap 15.3:cargo-1.59.0-150300.21.20.1.x86_64", "openSUSE Leap 15.3:cargo1.58-1.58.0-150300.7.3.1.aarch64", "openSUSE Leap 15.3:cargo1.58-1.58.0-150300.7.3.1.ppc64le", "openSUSE Leap 15.3:cargo1.58-1.58.0-150300.7.3.1.s390x", "openSUSE Leap 15.3:cargo1.58-1.58.0-150300.7.3.1.x86_64", "openSUSE Leap 15.3:cargo1.59-1.59.0-150300.7.4.2.aarch64", "openSUSE Leap 15.3:cargo1.59-1.59.0-150300.7.4.2.ppc64le", "openSUSE Leap 15.3:cargo1.59-1.59.0-150300.7.4.2.s390x", "openSUSE Leap 15.3:cargo1.59-1.59.0-150300.7.4.2.x86_64", "openSUSE Leap 15.3:rust-1.59.0-150300.21.20.1.aarch64", "openSUSE Leap 15.3:rust-1.59.0-150300.21.20.1.ppc64le", "openSUSE Leap 15.3:rust-1.59.0-150300.21.20.1.s390x", "openSUSE Leap 15.3:rust-1.59.0-150300.21.20.1.x86_64", "openSUSE Leap 15.3:rust1.58-1.58.0-150300.7.3.1.aarch64", "openSUSE Leap 15.3:rust1.58-1.58.0-150300.7.3.1.ppc64le", "openSUSE Leap 15.3:rust1.58-1.58.0-150300.7.3.1.s390x", "openSUSE Leap 15.3:rust1.58-1.58.0-150300.7.3.1.x86_64", "openSUSE Leap 15.3:rust1.59-1.59.0-150300.7.4.2.aarch64", "openSUSE Leap 15.3:rust1.59-1.59.0-150300.7.4.2.ppc64le", "openSUSE Leap 15.3:rust1.59-1.59.0-150300.7.4.2.s390x", "openSUSE Leap 15.3:rust1.59-1.59.0-150300.7.4.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-03-15T10:33:50Z", "details": "moderate" } ], "title": "CVE-2022-21658" } ] }
opensuse-su-2024:11769-1
Vulnerability from csaf_opensuse
Published
2024-06-15 00:00
Modified
2024-06-15 00:00
Summary
cargo1.58-1.58.0-2.1 on GA media
Notes
Title of the patch
cargo1.58-1.58.0-2.1 on GA media
Description of the patch
These are all security issues fixed in the cargo1.58-1.58.0-2.1 package on the GA media of openSUSE Tumbleweed.
Patchnames
openSUSE-Tumbleweed-2024-11769
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "cargo1.58-1.58.0-2.1 on GA media", "title": "Title of the patch" }, { "category": "description", "text": "These are all security issues fixed in the cargo1.58-1.58.0-2.1 package on the GA media of openSUSE Tumbleweed.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-Tumbleweed-2024-11769", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_11769-1.json" }, { "category": "self", "summary": "SUSE CVE CVE-2022-21658 page", "url": "https://www.suse.com/security/cve/CVE-2022-21658/" } ], "title": "cargo1.58-1.58.0-2.1 on GA media", "tracking": { "current_release_date": "2024-06-15T00:00:00Z", "generator": { "date": "2024-06-15T00:00:00Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2024:11769-1", "initial_release_date": "2024-06-15T00:00:00Z", "revision_history": [ { "date": "2024-06-15T00:00:00Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "cargo1.58-1.58.0-2.1.aarch64", "product": { "name": "cargo1.58-1.58.0-2.1.aarch64", "product_id": "cargo1.58-1.58.0-2.1.aarch64" } }, { "category": "product_version", "name": "rust1.58-1.58.0-2.1.aarch64", "product": { "name": "rust1.58-1.58.0-2.1.aarch64", "product_id": "rust1.58-1.58.0-2.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "cargo1.58-1.58.0-2.1.ppc64le", "product": { "name": "cargo1.58-1.58.0-2.1.ppc64le", "product_id": "cargo1.58-1.58.0-2.1.ppc64le" } }, { "category": "product_version", "name": "rust1.58-1.58.0-2.1.ppc64le", "product": { "name": "rust1.58-1.58.0-2.1.ppc64le", "product_id": "rust1.58-1.58.0-2.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "cargo1.58-1.58.0-2.1.s390x", "product": { "name": "cargo1.58-1.58.0-2.1.s390x", "product_id": "cargo1.58-1.58.0-2.1.s390x" } }, { "category": "product_version", "name": "rust1.58-1.58.0-2.1.s390x", "product": { "name": "rust1.58-1.58.0-2.1.s390x", "product_id": "rust1.58-1.58.0-2.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "cargo1.58-1.58.0-2.1.x86_64", "product": { "name": "cargo1.58-1.58.0-2.1.x86_64", "product_id": "cargo1.58-1.58.0-2.1.x86_64" } }, { "category": "product_version", "name": "rust1.58-1.58.0-2.1.x86_64", "product": { "name": "rust1.58-1.58.0-2.1.x86_64", "product_id": "rust1.58-1.58.0-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Tumbleweed", "product": { "name": "openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed", "product_identification_helper": { "cpe": "cpe:/o:opensuse:tumbleweed" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "cargo1.58-1.58.0-2.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:cargo1.58-1.58.0-2.1.aarch64" }, "product_reference": "cargo1.58-1.58.0-2.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "cargo1.58-1.58.0-2.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:cargo1.58-1.58.0-2.1.ppc64le" }, "product_reference": "cargo1.58-1.58.0-2.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "cargo1.58-1.58.0-2.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:cargo1.58-1.58.0-2.1.s390x" }, "product_reference": "cargo1.58-1.58.0-2.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "cargo1.58-1.58.0-2.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:cargo1.58-1.58.0-2.1.x86_64" }, "product_reference": "cargo1.58-1.58.0-2.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "rust1.58-1.58.0-2.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:rust1.58-1.58.0-2.1.aarch64" }, "product_reference": "rust1.58-1.58.0-2.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "rust1.58-1.58.0-2.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:rust1.58-1.58.0-2.1.ppc64le" }, "product_reference": "rust1.58-1.58.0-2.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "rust1.58-1.58.0-2.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:rust1.58-1.58.0-2.1.s390x" }, "product_reference": "rust1.58-1.58.0-2.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "rust1.58-1.58.0-2.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:rust1.58-1.58.0-2.1.x86_64" }, "product_reference": "rust1.58-1.58.0-2.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-21658", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-21658" } ], "notes": [ { "category": "general", "text": "Rust is a multi-paradigm, general-purpose programming language designed for performance and safety, especially safe concurrency. The Rust Security Response WG was notified that the `std::fs::remove_dir_all` standard library function is vulnerable a race condition enabling symlink following (CWE-363). An attacker could use this security issue to trick a privileged program into deleting files and directories the attacker couldn\u0027t otherwise access or delete. Rust 1.0.0 through Rust 1.58.0 is affected by this vulnerability with 1.58.1 containing a patch. Note that the following build targets don\u0027t have usable APIs to properly mitigate the attack, and are thus still vulnerable even with a patched toolchain: macOS before version 10.10 (Yosemite) and REDOX. We recommend everyone to update to Rust 1.58.1 as soon as possible, especially people developing programs expected to run in privileged contexts (including system daemons and setuid binaries), as those have the highest risk of being affected by this. Note that adding checks in your codebase before calling remove_dir_all will not mitigate the vulnerability, as they would also be vulnerable to race conditions like remove_dir_all itself. The existing mitigation is working as intended outside of race conditions.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:cargo1.58-1.58.0-2.1.aarch64", "openSUSE Tumbleweed:cargo1.58-1.58.0-2.1.ppc64le", "openSUSE Tumbleweed:cargo1.58-1.58.0-2.1.s390x", "openSUSE Tumbleweed:cargo1.58-1.58.0-2.1.x86_64", "openSUSE Tumbleweed:rust1.58-1.58.0-2.1.aarch64", "openSUSE Tumbleweed:rust1.58-1.58.0-2.1.ppc64le", "openSUSE Tumbleweed:rust1.58-1.58.0-2.1.s390x", "openSUSE Tumbleweed:rust1.58-1.58.0-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-21658", "url": "https://www.suse.com/security/cve/CVE-2022-21658" }, { "category": "external", "summary": "SUSE Bug 1194767 for CVE-2022-21658", "url": "https://bugzilla.suse.com/1194767" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:cargo1.58-1.58.0-2.1.aarch64", "openSUSE Tumbleweed:cargo1.58-1.58.0-2.1.ppc64le", "openSUSE Tumbleweed:cargo1.58-1.58.0-2.1.s390x", "openSUSE Tumbleweed:cargo1.58-1.58.0-2.1.x86_64", "openSUSE Tumbleweed:rust1.58-1.58.0-2.1.aarch64", "openSUSE Tumbleweed:rust1.58-1.58.0-2.1.ppc64le", "openSUSE Tumbleweed:rust1.58-1.58.0-2.1.s390x", "openSUSE Tumbleweed:rust1.58-1.58.0-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:cargo1.58-1.58.0-2.1.aarch64", "openSUSE Tumbleweed:cargo1.58-1.58.0-2.1.ppc64le", "openSUSE Tumbleweed:cargo1.58-1.58.0-2.1.s390x", "openSUSE Tumbleweed:cargo1.58-1.58.0-2.1.x86_64", "openSUSE Tumbleweed:rust1.58-1.58.0-2.1.aarch64", "openSUSE Tumbleweed:rust1.58-1.58.0-2.1.ppc64le", "openSUSE Tumbleweed:rust1.58-1.58.0-2.1.s390x", "openSUSE Tumbleweed:rust1.58-1.58.0-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2022-21658" } ] }
opensuse-su-2022:0175-1
Vulnerability from csaf_opensuse
Published
2022-01-25 13:10
Modified
2022-01-25 13:10
Summary
Security update for rust1.57
Notes
Title of the patch
Security update for rust1.57
Description of the patch
This update for rust1.57 fixes the following issues:
- CVE-2022-21658: Fixed race condition in std::fs::remove_dir_all (bsc#1194767).
Patchnames
openSUSE-SLE-15.3-2022-175
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for rust1.57", "title": "Title of the patch" }, { "category": "description", "text": "This update for rust1.57 fixes the following issues:\n\n- CVE-2022-21658: Fixed race condition in std::fs::remove_dir_all (bsc#1194767).\n", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-SLE-15.3-2022-175", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2022_0175-1.json" }, { "category": "self", "summary": "URL for openSUSE-SU-2022:0175-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7LMNDFMX4WXDPLRBNT2EQKB2QXZZVISA/" }, { "category": "self", "summary": "E-Mail link for openSUSE-SU-2022:0175-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7LMNDFMX4WXDPLRBNT2EQKB2QXZZVISA/" }, { "category": "self", "summary": "SUSE Bug 1194767", "url": "https://bugzilla.suse.com/1194767" }, { "category": "self", "summary": "SUSE CVE CVE-2022-21658 page", "url": "https://www.suse.com/security/cve/CVE-2022-21658/" } ], "title": "Security update for rust1.57", "tracking": { "current_release_date": "2022-01-25T13:10:43Z", "generator": { "date": "2022-01-25T13:10:43Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2022:0175-1", "initial_release_date": "2022-01-25T13:10:43Z", "revision_history": [ { "date": "2022-01-25T13:10:43Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "cargo1.57-1.57.0-150300.7.7.1.aarch64", "product": { "name": "cargo1.57-1.57.0-150300.7.7.1.aarch64", "product_id": "cargo1.57-1.57.0-150300.7.7.1.aarch64" } }, { "category": "product_version", "name": "rust1.57-1.57.0-150300.7.7.1.aarch64", "product": { "name": "rust1.57-1.57.0-150300.7.7.1.aarch64", "product_id": "rust1.57-1.57.0-150300.7.7.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "cargo1.57-1.57.0-150300.7.7.1.ppc64le", "product": { "name": "cargo1.57-1.57.0-150300.7.7.1.ppc64le", "product_id": "cargo1.57-1.57.0-150300.7.7.1.ppc64le" } }, { "category": "product_version", "name": "rust1.57-1.57.0-150300.7.7.1.ppc64le", "product": { "name": "rust1.57-1.57.0-150300.7.7.1.ppc64le", "product_id": "rust1.57-1.57.0-150300.7.7.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "cargo1.57-1.57.0-150300.7.7.1.s390x", "product": { "name": "cargo1.57-1.57.0-150300.7.7.1.s390x", "product_id": "cargo1.57-1.57.0-150300.7.7.1.s390x" } }, { "category": "product_version", "name": "rust1.57-1.57.0-150300.7.7.1.s390x", "product": { "name": "rust1.57-1.57.0-150300.7.7.1.s390x", "product_id": "rust1.57-1.57.0-150300.7.7.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "cargo1.57-1.57.0-150300.7.7.1.x86_64", "product": { "name": "cargo1.57-1.57.0-150300.7.7.1.x86_64", "product_id": "cargo1.57-1.57.0-150300.7.7.1.x86_64" } }, { "category": "product_version", "name": "rust1.57-1.57.0-150300.7.7.1.x86_64", "product": { "name": "rust1.57-1.57.0-150300.7.7.1.x86_64", "product_id": "rust1.57-1.57.0-150300.7.7.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Leap 15.3", "product": { "name": "openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3", "product_identification_helper": { "cpe": "cpe:/o:opensuse:leap:15.3" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "cargo1.57-1.57.0-150300.7.7.1.aarch64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:cargo1.57-1.57.0-150300.7.7.1.aarch64" }, "product_reference": "cargo1.57-1.57.0-150300.7.7.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "cargo1.57-1.57.0-150300.7.7.1.ppc64le as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:cargo1.57-1.57.0-150300.7.7.1.ppc64le" }, "product_reference": "cargo1.57-1.57.0-150300.7.7.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "cargo1.57-1.57.0-150300.7.7.1.s390x as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:cargo1.57-1.57.0-150300.7.7.1.s390x" }, "product_reference": "cargo1.57-1.57.0-150300.7.7.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "cargo1.57-1.57.0-150300.7.7.1.x86_64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:cargo1.57-1.57.0-150300.7.7.1.x86_64" }, "product_reference": "cargo1.57-1.57.0-150300.7.7.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "rust1.57-1.57.0-150300.7.7.1.aarch64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:rust1.57-1.57.0-150300.7.7.1.aarch64" }, "product_reference": "rust1.57-1.57.0-150300.7.7.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "rust1.57-1.57.0-150300.7.7.1.ppc64le as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:rust1.57-1.57.0-150300.7.7.1.ppc64le" }, "product_reference": "rust1.57-1.57.0-150300.7.7.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "rust1.57-1.57.0-150300.7.7.1.s390x as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:rust1.57-1.57.0-150300.7.7.1.s390x" }, "product_reference": "rust1.57-1.57.0-150300.7.7.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "rust1.57-1.57.0-150300.7.7.1.x86_64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:rust1.57-1.57.0-150300.7.7.1.x86_64" }, "product_reference": "rust1.57-1.57.0-150300.7.7.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.3" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-21658", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-21658" } ], "notes": [ { "category": "general", "text": "Rust is a multi-paradigm, general-purpose programming language designed for performance and safety, especially safe concurrency. The Rust Security Response WG was notified that the `std::fs::remove_dir_all` standard library function is vulnerable a race condition enabling symlink following (CWE-363). An attacker could use this security issue to trick a privileged program into deleting files and directories the attacker couldn\u0027t otherwise access or delete. Rust 1.0.0 through Rust 1.58.0 is affected by this vulnerability with 1.58.1 containing a patch. Note that the following build targets don\u0027t have usable APIs to properly mitigate the attack, and are thus still vulnerable even with a patched toolchain: macOS before version 10.10 (Yosemite) and REDOX. We recommend everyone to update to Rust 1.58.1 as soon as possible, especially people developing programs expected to run in privileged contexts (including system daemons and setuid binaries), as those have the highest risk of being affected by this. Note that adding checks in your codebase before calling remove_dir_all will not mitigate the vulnerability, as they would also be vulnerable to race conditions like remove_dir_all itself. The existing mitigation is working as intended outside of race conditions.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.3:cargo1.57-1.57.0-150300.7.7.1.aarch64", "openSUSE Leap 15.3:cargo1.57-1.57.0-150300.7.7.1.ppc64le", "openSUSE Leap 15.3:cargo1.57-1.57.0-150300.7.7.1.s390x", "openSUSE Leap 15.3:cargo1.57-1.57.0-150300.7.7.1.x86_64", "openSUSE Leap 15.3:rust1.57-1.57.0-150300.7.7.1.aarch64", "openSUSE Leap 15.3:rust1.57-1.57.0-150300.7.7.1.ppc64le", "openSUSE Leap 15.3:rust1.57-1.57.0-150300.7.7.1.s390x", "openSUSE Leap 15.3:rust1.57-1.57.0-150300.7.7.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-21658", "url": "https://www.suse.com/security/cve/CVE-2022-21658" }, { "category": "external", "summary": "SUSE Bug 1194767 for CVE-2022-21658", "url": "https://bugzilla.suse.com/1194767" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.3:cargo1.57-1.57.0-150300.7.7.1.aarch64", "openSUSE Leap 15.3:cargo1.57-1.57.0-150300.7.7.1.ppc64le", "openSUSE Leap 15.3:cargo1.57-1.57.0-150300.7.7.1.s390x", "openSUSE Leap 15.3:cargo1.57-1.57.0-150300.7.7.1.x86_64", "openSUSE Leap 15.3:rust1.57-1.57.0-150300.7.7.1.aarch64", "openSUSE Leap 15.3:rust1.57-1.57.0-150300.7.7.1.ppc64le", "openSUSE Leap 15.3:rust1.57-1.57.0-150300.7.7.1.s390x", "openSUSE Leap 15.3:rust1.57-1.57.0-150300.7.7.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "openSUSE Leap 15.3:cargo1.57-1.57.0-150300.7.7.1.aarch64", "openSUSE Leap 15.3:cargo1.57-1.57.0-150300.7.7.1.ppc64le", "openSUSE Leap 15.3:cargo1.57-1.57.0-150300.7.7.1.s390x", "openSUSE Leap 15.3:cargo1.57-1.57.0-150300.7.7.1.x86_64", "openSUSE Leap 15.3:rust1.57-1.57.0-150300.7.7.1.aarch64", "openSUSE Leap 15.3:rust1.57-1.57.0-150300.7.7.1.ppc64le", "openSUSE Leap 15.3:rust1.57-1.57.0-150300.7.7.1.s390x", "openSUSE Leap 15.3:rust1.57-1.57.0-150300.7.7.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-01-25T13:10:43Z", "details": "moderate" } ], "title": "CVE-2022-21658" } ] }
opensuse-su-2024:11767-1
Vulnerability from csaf_opensuse
Published
2024-06-15 00:00
Modified
2024-06-15 00:00
Summary
cargo1.56-1.56.1-4.1 on GA media
Notes
Title of the patch
cargo1.56-1.56.1-4.1 on GA media
Description of the patch
These are all security issues fixed in the cargo1.56-1.56.1-4.1 package on the GA media of openSUSE Tumbleweed.
Patchnames
openSUSE-Tumbleweed-2024-11767
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "cargo1.56-1.56.1-4.1 on GA media", "title": "Title of the patch" }, { "category": "description", "text": "These are all security issues fixed in the cargo1.56-1.56.1-4.1 package on the GA media of openSUSE Tumbleweed.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-Tumbleweed-2024-11767", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_11767-1.json" }, { "category": "self", "summary": "SUSE CVE CVE-2022-21658 page", "url": "https://www.suse.com/security/cve/CVE-2022-21658/" } ], "title": "cargo1.56-1.56.1-4.1 on GA media", "tracking": { "current_release_date": "2024-06-15T00:00:00Z", "generator": { "date": "2024-06-15T00:00:00Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2024:11767-1", "initial_release_date": "2024-06-15T00:00:00Z", "revision_history": [ { "date": "2024-06-15T00:00:00Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "cargo1.56-1.56.1-4.1.aarch64", "product": { "name": "cargo1.56-1.56.1-4.1.aarch64", "product_id": "cargo1.56-1.56.1-4.1.aarch64" } }, { "category": "product_version", "name": "rust1.56-1.56.1-4.1.aarch64", "product": { "name": "rust1.56-1.56.1-4.1.aarch64", "product_id": "rust1.56-1.56.1-4.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "cargo1.56-1.56.1-4.1.ppc64le", "product": { "name": "cargo1.56-1.56.1-4.1.ppc64le", "product_id": "cargo1.56-1.56.1-4.1.ppc64le" } }, { "category": "product_version", "name": "rust1.56-1.56.1-4.1.ppc64le", "product": { "name": "rust1.56-1.56.1-4.1.ppc64le", "product_id": "rust1.56-1.56.1-4.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "cargo1.56-1.56.1-4.1.s390x", "product": { "name": "cargo1.56-1.56.1-4.1.s390x", "product_id": "cargo1.56-1.56.1-4.1.s390x" } }, { "category": "product_version", "name": "rust1.56-1.56.1-4.1.s390x", "product": { "name": "rust1.56-1.56.1-4.1.s390x", "product_id": "rust1.56-1.56.1-4.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "cargo1.56-1.56.1-4.1.x86_64", "product": { "name": "cargo1.56-1.56.1-4.1.x86_64", "product_id": "cargo1.56-1.56.1-4.1.x86_64" } }, { "category": "product_version", "name": "rust1.56-1.56.1-4.1.x86_64", "product": { "name": "rust1.56-1.56.1-4.1.x86_64", "product_id": "rust1.56-1.56.1-4.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Tumbleweed", "product": { "name": "openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed", "product_identification_helper": { "cpe": "cpe:/o:opensuse:tumbleweed" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "cargo1.56-1.56.1-4.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:cargo1.56-1.56.1-4.1.aarch64" }, "product_reference": "cargo1.56-1.56.1-4.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "cargo1.56-1.56.1-4.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:cargo1.56-1.56.1-4.1.ppc64le" }, "product_reference": "cargo1.56-1.56.1-4.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "cargo1.56-1.56.1-4.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:cargo1.56-1.56.1-4.1.s390x" }, "product_reference": "cargo1.56-1.56.1-4.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "cargo1.56-1.56.1-4.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:cargo1.56-1.56.1-4.1.x86_64" }, "product_reference": "cargo1.56-1.56.1-4.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "rust1.56-1.56.1-4.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:rust1.56-1.56.1-4.1.aarch64" }, "product_reference": "rust1.56-1.56.1-4.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "rust1.56-1.56.1-4.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:rust1.56-1.56.1-4.1.ppc64le" }, "product_reference": "rust1.56-1.56.1-4.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "rust1.56-1.56.1-4.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:rust1.56-1.56.1-4.1.s390x" }, "product_reference": "rust1.56-1.56.1-4.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "rust1.56-1.56.1-4.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:rust1.56-1.56.1-4.1.x86_64" }, "product_reference": "rust1.56-1.56.1-4.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-21658", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-21658" } ], "notes": [ { "category": "general", "text": "Rust is a multi-paradigm, general-purpose programming language designed for performance and safety, especially safe concurrency. The Rust Security Response WG was notified that the `std::fs::remove_dir_all` standard library function is vulnerable a race condition enabling symlink following (CWE-363). An attacker could use this security issue to trick a privileged program into deleting files and directories the attacker couldn\u0027t otherwise access or delete. Rust 1.0.0 through Rust 1.58.0 is affected by this vulnerability with 1.58.1 containing a patch. Note that the following build targets don\u0027t have usable APIs to properly mitigate the attack, and are thus still vulnerable even with a patched toolchain: macOS before version 10.10 (Yosemite) and REDOX. We recommend everyone to update to Rust 1.58.1 as soon as possible, especially people developing programs expected to run in privileged contexts (including system daemons and setuid binaries), as those have the highest risk of being affected by this. Note that adding checks in your codebase before calling remove_dir_all will not mitigate the vulnerability, as they would also be vulnerable to race conditions like remove_dir_all itself. The existing mitigation is working as intended outside of race conditions.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:cargo1.56-1.56.1-4.1.aarch64", "openSUSE Tumbleweed:cargo1.56-1.56.1-4.1.ppc64le", "openSUSE Tumbleweed:cargo1.56-1.56.1-4.1.s390x", "openSUSE Tumbleweed:cargo1.56-1.56.1-4.1.x86_64", "openSUSE Tumbleweed:rust1.56-1.56.1-4.1.aarch64", "openSUSE Tumbleweed:rust1.56-1.56.1-4.1.ppc64le", "openSUSE Tumbleweed:rust1.56-1.56.1-4.1.s390x", "openSUSE Tumbleweed:rust1.56-1.56.1-4.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-21658", "url": "https://www.suse.com/security/cve/CVE-2022-21658" }, { "category": "external", "summary": "SUSE Bug 1194767 for CVE-2022-21658", "url": "https://bugzilla.suse.com/1194767" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:cargo1.56-1.56.1-4.1.aarch64", "openSUSE Tumbleweed:cargo1.56-1.56.1-4.1.ppc64le", "openSUSE Tumbleweed:cargo1.56-1.56.1-4.1.s390x", "openSUSE Tumbleweed:cargo1.56-1.56.1-4.1.x86_64", "openSUSE Tumbleweed:rust1.56-1.56.1-4.1.aarch64", "openSUSE Tumbleweed:rust1.56-1.56.1-4.1.ppc64le", "openSUSE Tumbleweed:rust1.56-1.56.1-4.1.s390x", "openSUSE Tumbleweed:rust1.56-1.56.1-4.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:cargo1.56-1.56.1-4.1.aarch64", "openSUSE Tumbleweed:cargo1.56-1.56.1-4.1.ppc64le", "openSUSE Tumbleweed:cargo1.56-1.56.1-4.1.s390x", "openSUSE Tumbleweed:cargo1.56-1.56.1-4.1.x86_64", "openSUSE Tumbleweed:rust1.56-1.56.1-4.1.aarch64", "openSUSE Tumbleweed:rust1.56-1.56.1-4.1.ppc64le", "openSUSE Tumbleweed:rust1.56-1.56.1-4.1.s390x", "openSUSE Tumbleweed:rust1.56-1.56.1-4.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2022-21658" } ] }
opensuse-su-2022:0149-1
Vulnerability from csaf_opensuse
Published
2022-01-21 08:04
Modified
2022-01-21 08:04
Summary
Security update for rust1.56
Notes
Title of the patch
Security update for rust1.56
Description of the patch
This update for rust1.56 fixes the following issues:
- CVE-2022-21658: Fixed race condition in std::fs::remove_dir_all (bsc#1194767).
Patchnames
openSUSE-2022-149,openSUSE-SLE-15.3-2022-149
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for rust1.56", "title": "Title of the patch" }, { "category": "description", "text": "This update for rust1.56 fixes the following issues:\n\n- CVE-2022-21658: Fixed race condition in std::fs::remove_dir_all (bsc#1194767).\n", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-2022-149,openSUSE-SLE-15.3-2022-149", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2022_0149-1.json" }, { "category": "self", "summary": "URL for openSUSE-SU-2022:0149-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JWT2GLRS2EG6EW7X57X2RMJHMFK6GEWU/" }, { "category": "self", "summary": "E-Mail link for openSUSE-SU-2022:0149-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JWT2GLRS2EG6EW7X57X2RMJHMFK6GEWU/" }, { "category": "self", "summary": "SUSE Bug 1194767", "url": "https://bugzilla.suse.com/1194767" }, { "category": "self", "summary": "SUSE CVE CVE-2022-21658 page", "url": "https://www.suse.com/security/cve/CVE-2022-21658/" } ], "title": "Security update for rust1.56", "tracking": { "current_release_date": "2022-01-21T08:04:54Z", "generator": { "date": "2022-01-21T08:04:54Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2022:0149-1", "initial_release_date": "2022-01-21T08:04:54Z", "revision_history": [ { "date": "2022-01-21T08:04:54Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "libredwg-devel-0.12.5-bp153.2.3.1.aarch64", "product": { "name": "libredwg-devel-0.12.5-bp153.2.3.1.aarch64", "product_id": "libredwg-devel-0.12.5-bp153.2.3.1.aarch64" } }, { "category": "product_version", "name": "libredwg-tools-0.12.5-bp153.2.3.1.aarch64", "product": { "name": "libredwg-tools-0.12.5-bp153.2.3.1.aarch64", "product_id": "libredwg-tools-0.12.5-bp153.2.3.1.aarch64" } }, { "category": "product_version", "name": "libredwg0-0.12.5-bp153.2.3.1.aarch64", "product": { "name": "libredwg0-0.12.5-bp153.2.3.1.aarch64", "product_id": "libredwg0-0.12.5-bp153.2.3.1.aarch64" } }, { "category": "product_version", "name": "cargo1.56-1.56.1-150300.7.6.1.aarch64", "product": { "name": "cargo1.56-1.56.1-150300.7.6.1.aarch64", "product_id": "cargo1.56-1.56.1-150300.7.6.1.aarch64" } }, { "category": "product_version", "name": "rust1.56-1.56.1-150300.7.6.1.aarch64", "product": { "name": "rust1.56-1.56.1-150300.7.6.1.aarch64", "product_id": "rust1.56-1.56.1-150300.7.6.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "libredwg-devel-0.12.5-bp153.2.3.1.i586", "product": { "name": "libredwg-devel-0.12.5-bp153.2.3.1.i586", "product_id": "libredwg-devel-0.12.5-bp153.2.3.1.i586" } }, { "category": "product_version", "name": "libredwg-tools-0.12.5-bp153.2.3.1.i586", "product": { "name": "libredwg-tools-0.12.5-bp153.2.3.1.i586", "product_id": "libredwg-tools-0.12.5-bp153.2.3.1.i586" } }, { "category": "product_version", "name": "libredwg0-0.12.5-bp153.2.3.1.i586", "product": { "name": "libredwg0-0.12.5-bp153.2.3.1.i586", "product_id": "libredwg0-0.12.5-bp153.2.3.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "libredwg-devel-0.12.5-bp153.2.3.1.ppc64le", "product": { "name": "libredwg-devel-0.12.5-bp153.2.3.1.ppc64le", "product_id": "libredwg-devel-0.12.5-bp153.2.3.1.ppc64le" } }, { "category": "product_version", "name": "libredwg-tools-0.12.5-bp153.2.3.1.ppc64le", "product": { "name": "libredwg-tools-0.12.5-bp153.2.3.1.ppc64le", "product_id": "libredwg-tools-0.12.5-bp153.2.3.1.ppc64le" } }, { "category": "product_version", "name": "libredwg0-0.12.5-bp153.2.3.1.ppc64le", "product": { "name": "libredwg0-0.12.5-bp153.2.3.1.ppc64le", "product_id": "libredwg0-0.12.5-bp153.2.3.1.ppc64le" } }, { "category": "product_version", "name": "cargo1.56-1.56.1-150300.7.6.1.ppc64le", "product": { "name": "cargo1.56-1.56.1-150300.7.6.1.ppc64le", "product_id": "cargo1.56-1.56.1-150300.7.6.1.ppc64le" } }, { "category": "product_version", "name": "rust1.56-1.56.1-150300.7.6.1.ppc64le", "product": { "name": "rust1.56-1.56.1-150300.7.6.1.ppc64le", "product_id": "rust1.56-1.56.1-150300.7.6.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "libredwg-devel-0.12.5-bp153.2.3.1.s390x", "product": { "name": "libredwg-devel-0.12.5-bp153.2.3.1.s390x", "product_id": "libredwg-devel-0.12.5-bp153.2.3.1.s390x" } }, { "category": "product_version", "name": "libredwg-tools-0.12.5-bp153.2.3.1.s390x", "product": { "name": "libredwg-tools-0.12.5-bp153.2.3.1.s390x", "product_id": "libredwg-tools-0.12.5-bp153.2.3.1.s390x" } }, { "category": "product_version", "name": "libredwg0-0.12.5-bp153.2.3.1.s390x", "product": { "name": "libredwg0-0.12.5-bp153.2.3.1.s390x", "product_id": "libredwg0-0.12.5-bp153.2.3.1.s390x" } }, { "category": "product_version", "name": "cargo1.56-1.56.1-150300.7.6.1.s390x", "product": { "name": "cargo1.56-1.56.1-150300.7.6.1.s390x", "product_id": "cargo1.56-1.56.1-150300.7.6.1.s390x" } }, { "category": "product_version", "name": "rust1.56-1.56.1-150300.7.6.1.s390x", "product": { "name": "rust1.56-1.56.1-150300.7.6.1.s390x", "product_id": "rust1.56-1.56.1-150300.7.6.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "libredwg-devel-0.12.5-bp153.2.3.1.x86_64", "product": { "name": "libredwg-devel-0.12.5-bp153.2.3.1.x86_64", "product_id": "libredwg-devel-0.12.5-bp153.2.3.1.x86_64" } }, { "category": "product_version", "name": "libredwg-tools-0.12.5-bp153.2.3.1.x86_64", "product": { "name": "libredwg-tools-0.12.5-bp153.2.3.1.x86_64", "product_id": "libredwg-tools-0.12.5-bp153.2.3.1.x86_64" } }, { "category": "product_version", "name": "libredwg0-0.12.5-bp153.2.3.1.x86_64", "product": { "name": "libredwg0-0.12.5-bp153.2.3.1.x86_64", "product_id": "libredwg0-0.12.5-bp153.2.3.1.x86_64" } }, { "category": "product_version", "name": "cargo1.56-1.56.1-150300.7.6.1.x86_64", "product": { "name": "cargo1.56-1.56.1-150300.7.6.1.x86_64", "product_id": "cargo1.56-1.56.1-150300.7.6.1.x86_64" } }, { "category": "product_version", "name": "rust1.56-1.56.1-150300.7.6.1.x86_64", "product": { "name": "rust1.56-1.56.1-150300.7.6.1.x86_64", "product_id": "rust1.56-1.56.1-150300.7.6.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Package Hub 15 SP3", "product": { "name": "SUSE Package Hub 15 SP3", "product_id": "SUSE Package Hub 15 SP3" } }, { "category": "product_name", "name": "openSUSE Leap 15.3", "product": { "name": "openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3", "product_identification_helper": { "cpe": "cpe:/o:opensuse:leap:15.3" } } }, { "category": "product_name", "name": "openSUSE Leap 15.3", "product": { "name": "openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3", "product_identification_helper": { "cpe": "cpe:/o:opensuse:leap:15.3" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "libredwg-devel-0.12.5-bp153.2.3.1.aarch64 as component of SUSE Package Hub 15 SP3", "product_id": "SUSE Package Hub 15 SP3:libredwg-devel-0.12.5-bp153.2.3.1.aarch64" }, "product_reference": "libredwg-devel-0.12.5-bp153.2.3.1.aarch64", "relates_to_product_reference": "SUSE Package Hub 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "libredwg-devel-0.12.5-bp153.2.3.1.i586 as component of SUSE Package Hub 15 SP3", "product_id": "SUSE Package Hub 15 SP3:libredwg-devel-0.12.5-bp153.2.3.1.i586" }, "product_reference": "libredwg-devel-0.12.5-bp153.2.3.1.i586", "relates_to_product_reference": "SUSE Package Hub 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "libredwg-devel-0.12.5-bp153.2.3.1.ppc64le as component of SUSE Package Hub 15 SP3", "product_id": "SUSE Package Hub 15 SP3:libredwg-devel-0.12.5-bp153.2.3.1.ppc64le" }, "product_reference": "libredwg-devel-0.12.5-bp153.2.3.1.ppc64le", "relates_to_product_reference": "SUSE Package Hub 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "libredwg-devel-0.12.5-bp153.2.3.1.s390x as component of SUSE Package Hub 15 SP3", "product_id": "SUSE Package Hub 15 SP3:libredwg-devel-0.12.5-bp153.2.3.1.s390x" }, "product_reference": "libredwg-devel-0.12.5-bp153.2.3.1.s390x", "relates_to_product_reference": "SUSE Package Hub 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "libredwg-devel-0.12.5-bp153.2.3.1.x86_64 as component of SUSE Package Hub 15 SP3", "product_id": "SUSE Package Hub 15 SP3:libredwg-devel-0.12.5-bp153.2.3.1.x86_64" }, "product_reference": "libredwg-devel-0.12.5-bp153.2.3.1.x86_64", "relates_to_product_reference": "SUSE Package Hub 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "libredwg-tools-0.12.5-bp153.2.3.1.aarch64 as component of SUSE Package Hub 15 SP3", "product_id": "SUSE Package Hub 15 SP3:libredwg-tools-0.12.5-bp153.2.3.1.aarch64" }, "product_reference": "libredwg-tools-0.12.5-bp153.2.3.1.aarch64", "relates_to_product_reference": "SUSE Package Hub 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "libredwg-tools-0.12.5-bp153.2.3.1.i586 as component of SUSE Package Hub 15 SP3", "product_id": "SUSE Package Hub 15 SP3:libredwg-tools-0.12.5-bp153.2.3.1.i586" }, "product_reference": "libredwg-tools-0.12.5-bp153.2.3.1.i586", "relates_to_product_reference": "SUSE Package Hub 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "libredwg-tools-0.12.5-bp153.2.3.1.ppc64le as component of SUSE Package Hub 15 SP3", "product_id": "SUSE Package Hub 15 SP3:libredwg-tools-0.12.5-bp153.2.3.1.ppc64le" }, "product_reference": "libredwg-tools-0.12.5-bp153.2.3.1.ppc64le", "relates_to_product_reference": "SUSE Package Hub 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "libredwg-tools-0.12.5-bp153.2.3.1.s390x as component of SUSE Package Hub 15 SP3", "product_id": "SUSE Package Hub 15 SP3:libredwg-tools-0.12.5-bp153.2.3.1.s390x" }, "product_reference": "libredwg-tools-0.12.5-bp153.2.3.1.s390x", "relates_to_product_reference": "SUSE Package Hub 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "libredwg-tools-0.12.5-bp153.2.3.1.x86_64 as component of SUSE Package Hub 15 SP3", "product_id": "SUSE Package Hub 15 SP3:libredwg-tools-0.12.5-bp153.2.3.1.x86_64" }, "product_reference": "libredwg-tools-0.12.5-bp153.2.3.1.x86_64", "relates_to_product_reference": "SUSE Package Hub 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "libredwg0-0.12.5-bp153.2.3.1.aarch64 as component of SUSE Package Hub 15 SP3", "product_id": "SUSE Package Hub 15 SP3:libredwg0-0.12.5-bp153.2.3.1.aarch64" }, "product_reference": "libredwg0-0.12.5-bp153.2.3.1.aarch64", "relates_to_product_reference": "SUSE Package Hub 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "libredwg0-0.12.5-bp153.2.3.1.i586 as component of SUSE Package Hub 15 SP3", "product_id": "SUSE Package Hub 15 SP3:libredwg0-0.12.5-bp153.2.3.1.i586" }, "product_reference": "libredwg0-0.12.5-bp153.2.3.1.i586", "relates_to_product_reference": "SUSE Package Hub 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "libredwg0-0.12.5-bp153.2.3.1.ppc64le as component of SUSE Package Hub 15 SP3", "product_id": "SUSE Package Hub 15 SP3:libredwg0-0.12.5-bp153.2.3.1.ppc64le" }, "product_reference": "libredwg0-0.12.5-bp153.2.3.1.ppc64le", "relates_to_product_reference": "SUSE Package Hub 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "libredwg0-0.12.5-bp153.2.3.1.s390x as component of SUSE Package Hub 15 SP3", "product_id": "SUSE Package Hub 15 SP3:libredwg0-0.12.5-bp153.2.3.1.s390x" }, "product_reference": "libredwg0-0.12.5-bp153.2.3.1.s390x", "relates_to_product_reference": "SUSE Package Hub 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "libredwg0-0.12.5-bp153.2.3.1.x86_64 as component of SUSE Package Hub 15 SP3", "product_id": "SUSE Package Hub 15 SP3:libredwg0-0.12.5-bp153.2.3.1.x86_64" }, "product_reference": "libredwg0-0.12.5-bp153.2.3.1.x86_64", "relates_to_product_reference": "SUSE Package Hub 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "libredwg-devel-0.12.5-bp153.2.3.1.aarch64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:libredwg-devel-0.12.5-bp153.2.3.1.aarch64" }, "product_reference": "libredwg-devel-0.12.5-bp153.2.3.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "libredwg-devel-0.12.5-bp153.2.3.1.i586 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:libredwg-devel-0.12.5-bp153.2.3.1.i586" }, "product_reference": "libredwg-devel-0.12.5-bp153.2.3.1.i586", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "libredwg-devel-0.12.5-bp153.2.3.1.ppc64le as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:libredwg-devel-0.12.5-bp153.2.3.1.ppc64le" }, "product_reference": "libredwg-devel-0.12.5-bp153.2.3.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "libredwg-devel-0.12.5-bp153.2.3.1.s390x as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:libredwg-devel-0.12.5-bp153.2.3.1.s390x" }, "product_reference": "libredwg-devel-0.12.5-bp153.2.3.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "libredwg-devel-0.12.5-bp153.2.3.1.x86_64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:libredwg-devel-0.12.5-bp153.2.3.1.x86_64" }, "product_reference": "libredwg-devel-0.12.5-bp153.2.3.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "libredwg-tools-0.12.5-bp153.2.3.1.aarch64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:libredwg-tools-0.12.5-bp153.2.3.1.aarch64" }, "product_reference": "libredwg-tools-0.12.5-bp153.2.3.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "libredwg-tools-0.12.5-bp153.2.3.1.i586 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:libredwg-tools-0.12.5-bp153.2.3.1.i586" }, "product_reference": "libredwg-tools-0.12.5-bp153.2.3.1.i586", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "libredwg-tools-0.12.5-bp153.2.3.1.ppc64le as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:libredwg-tools-0.12.5-bp153.2.3.1.ppc64le" }, "product_reference": "libredwg-tools-0.12.5-bp153.2.3.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "libredwg-tools-0.12.5-bp153.2.3.1.s390x as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:libredwg-tools-0.12.5-bp153.2.3.1.s390x" }, "product_reference": "libredwg-tools-0.12.5-bp153.2.3.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "libredwg-tools-0.12.5-bp153.2.3.1.x86_64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:libredwg-tools-0.12.5-bp153.2.3.1.x86_64" }, "product_reference": "libredwg-tools-0.12.5-bp153.2.3.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "libredwg0-0.12.5-bp153.2.3.1.aarch64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:libredwg0-0.12.5-bp153.2.3.1.aarch64" }, "product_reference": "libredwg0-0.12.5-bp153.2.3.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "libredwg0-0.12.5-bp153.2.3.1.i586 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:libredwg0-0.12.5-bp153.2.3.1.i586" }, "product_reference": "libredwg0-0.12.5-bp153.2.3.1.i586", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "libredwg0-0.12.5-bp153.2.3.1.ppc64le as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:libredwg0-0.12.5-bp153.2.3.1.ppc64le" }, "product_reference": "libredwg0-0.12.5-bp153.2.3.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "libredwg0-0.12.5-bp153.2.3.1.s390x as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:libredwg0-0.12.5-bp153.2.3.1.s390x" }, "product_reference": "libredwg0-0.12.5-bp153.2.3.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "libredwg0-0.12.5-bp153.2.3.1.x86_64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:libredwg0-0.12.5-bp153.2.3.1.x86_64" }, "product_reference": "libredwg0-0.12.5-bp153.2.3.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "cargo1.56-1.56.1-150300.7.6.1.aarch64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:cargo1.56-1.56.1-150300.7.6.1.aarch64" }, "product_reference": "cargo1.56-1.56.1-150300.7.6.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "cargo1.56-1.56.1-150300.7.6.1.ppc64le as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:cargo1.56-1.56.1-150300.7.6.1.ppc64le" }, "product_reference": "cargo1.56-1.56.1-150300.7.6.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "cargo1.56-1.56.1-150300.7.6.1.s390x as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:cargo1.56-1.56.1-150300.7.6.1.s390x" }, "product_reference": "cargo1.56-1.56.1-150300.7.6.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "cargo1.56-1.56.1-150300.7.6.1.x86_64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:cargo1.56-1.56.1-150300.7.6.1.x86_64" }, "product_reference": "cargo1.56-1.56.1-150300.7.6.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "rust1.56-1.56.1-150300.7.6.1.aarch64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:rust1.56-1.56.1-150300.7.6.1.aarch64" }, "product_reference": "rust1.56-1.56.1-150300.7.6.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "rust1.56-1.56.1-150300.7.6.1.ppc64le as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:rust1.56-1.56.1-150300.7.6.1.ppc64le" }, "product_reference": "rust1.56-1.56.1-150300.7.6.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "rust1.56-1.56.1-150300.7.6.1.s390x as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:rust1.56-1.56.1-150300.7.6.1.s390x" }, "product_reference": "rust1.56-1.56.1-150300.7.6.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "rust1.56-1.56.1-150300.7.6.1.x86_64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:rust1.56-1.56.1-150300.7.6.1.x86_64" }, "product_reference": "rust1.56-1.56.1-150300.7.6.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "libredwg-devel-0.12.5-bp153.2.3.1.aarch64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:libredwg-devel-0.12.5-bp153.2.3.1.aarch64" }, "product_reference": "libredwg-devel-0.12.5-bp153.2.3.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "libredwg-devel-0.12.5-bp153.2.3.1.i586 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:libredwg-devel-0.12.5-bp153.2.3.1.i586" }, "product_reference": "libredwg-devel-0.12.5-bp153.2.3.1.i586", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "libredwg-devel-0.12.5-bp153.2.3.1.ppc64le as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:libredwg-devel-0.12.5-bp153.2.3.1.ppc64le" }, "product_reference": "libredwg-devel-0.12.5-bp153.2.3.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "libredwg-devel-0.12.5-bp153.2.3.1.s390x as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:libredwg-devel-0.12.5-bp153.2.3.1.s390x" }, "product_reference": "libredwg-devel-0.12.5-bp153.2.3.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "libredwg-devel-0.12.5-bp153.2.3.1.x86_64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:libredwg-devel-0.12.5-bp153.2.3.1.x86_64" }, "product_reference": "libredwg-devel-0.12.5-bp153.2.3.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "libredwg-tools-0.12.5-bp153.2.3.1.aarch64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:libredwg-tools-0.12.5-bp153.2.3.1.aarch64" }, "product_reference": "libredwg-tools-0.12.5-bp153.2.3.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "libredwg-tools-0.12.5-bp153.2.3.1.i586 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:libredwg-tools-0.12.5-bp153.2.3.1.i586" }, "product_reference": "libredwg-tools-0.12.5-bp153.2.3.1.i586", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "libredwg-tools-0.12.5-bp153.2.3.1.ppc64le as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:libredwg-tools-0.12.5-bp153.2.3.1.ppc64le" }, "product_reference": "libredwg-tools-0.12.5-bp153.2.3.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "libredwg-tools-0.12.5-bp153.2.3.1.s390x as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:libredwg-tools-0.12.5-bp153.2.3.1.s390x" }, "product_reference": "libredwg-tools-0.12.5-bp153.2.3.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "libredwg-tools-0.12.5-bp153.2.3.1.x86_64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:libredwg-tools-0.12.5-bp153.2.3.1.x86_64" }, "product_reference": "libredwg-tools-0.12.5-bp153.2.3.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "libredwg0-0.12.5-bp153.2.3.1.aarch64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:libredwg0-0.12.5-bp153.2.3.1.aarch64" }, "product_reference": "libredwg0-0.12.5-bp153.2.3.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "libredwg0-0.12.5-bp153.2.3.1.i586 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:libredwg0-0.12.5-bp153.2.3.1.i586" }, "product_reference": "libredwg0-0.12.5-bp153.2.3.1.i586", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "libredwg0-0.12.5-bp153.2.3.1.ppc64le as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:libredwg0-0.12.5-bp153.2.3.1.ppc64le" }, "product_reference": "libredwg0-0.12.5-bp153.2.3.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "libredwg0-0.12.5-bp153.2.3.1.s390x as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:libredwg0-0.12.5-bp153.2.3.1.s390x" }, "product_reference": "libredwg0-0.12.5-bp153.2.3.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "libredwg0-0.12.5-bp153.2.3.1.x86_64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:libredwg0-0.12.5-bp153.2.3.1.x86_64" }, "product_reference": "libredwg0-0.12.5-bp153.2.3.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "cargo1.56-1.56.1-150300.7.6.1.aarch64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:cargo1.56-1.56.1-150300.7.6.1.aarch64" }, "product_reference": "cargo1.56-1.56.1-150300.7.6.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "cargo1.56-1.56.1-150300.7.6.1.ppc64le as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:cargo1.56-1.56.1-150300.7.6.1.ppc64le" }, "product_reference": "cargo1.56-1.56.1-150300.7.6.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "cargo1.56-1.56.1-150300.7.6.1.s390x as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:cargo1.56-1.56.1-150300.7.6.1.s390x" }, "product_reference": "cargo1.56-1.56.1-150300.7.6.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "cargo1.56-1.56.1-150300.7.6.1.x86_64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:cargo1.56-1.56.1-150300.7.6.1.x86_64" }, "product_reference": "cargo1.56-1.56.1-150300.7.6.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "rust1.56-1.56.1-150300.7.6.1.aarch64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:rust1.56-1.56.1-150300.7.6.1.aarch64" }, "product_reference": "rust1.56-1.56.1-150300.7.6.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "rust1.56-1.56.1-150300.7.6.1.ppc64le as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:rust1.56-1.56.1-150300.7.6.1.ppc64le" }, "product_reference": "rust1.56-1.56.1-150300.7.6.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "rust1.56-1.56.1-150300.7.6.1.s390x as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:rust1.56-1.56.1-150300.7.6.1.s390x" }, "product_reference": "rust1.56-1.56.1-150300.7.6.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "rust1.56-1.56.1-150300.7.6.1.x86_64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:rust1.56-1.56.1-150300.7.6.1.x86_64" }, "product_reference": "rust1.56-1.56.1-150300.7.6.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.3" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-21658", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-21658" } ], "notes": [ { "category": "general", "text": "Rust is a multi-paradigm, general-purpose programming language designed for performance and safety, especially safe concurrency. The Rust Security Response WG was notified that the `std::fs::remove_dir_all` standard library function is vulnerable a race condition enabling symlink following (CWE-363). An attacker could use this security issue to trick a privileged program into deleting files and directories the attacker couldn\u0027t otherwise access or delete. Rust 1.0.0 through Rust 1.58.0 is affected by this vulnerability with 1.58.1 containing a patch. Note that the following build targets don\u0027t have usable APIs to properly mitigate the attack, and are thus still vulnerable even with a patched toolchain: macOS before version 10.10 (Yosemite) and REDOX. We recommend everyone to update to Rust 1.58.1 as soon as possible, especially people developing programs expected to run in privileged contexts (including system daemons and setuid binaries), as those have the highest risk of being affected by this. Note that adding checks in your codebase before calling remove_dir_all will not mitigate the vulnerability, as they would also be vulnerable to race conditions like remove_dir_all itself. The existing mitigation is working as intended outside of race conditions.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Package Hub 15 SP3:libredwg-devel-0.12.5-bp153.2.3.1.aarch64", "SUSE Package Hub 15 SP3:libredwg-devel-0.12.5-bp153.2.3.1.i586", "SUSE Package Hub 15 SP3:libredwg-devel-0.12.5-bp153.2.3.1.ppc64le", "SUSE Package Hub 15 SP3:libredwg-devel-0.12.5-bp153.2.3.1.s390x", "SUSE Package Hub 15 SP3:libredwg-devel-0.12.5-bp153.2.3.1.x86_64", "SUSE Package Hub 15 SP3:libredwg-tools-0.12.5-bp153.2.3.1.aarch64", "SUSE Package Hub 15 SP3:libredwg-tools-0.12.5-bp153.2.3.1.i586", "SUSE Package Hub 15 SP3:libredwg-tools-0.12.5-bp153.2.3.1.ppc64le", "SUSE Package Hub 15 SP3:libredwg-tools-0.12.5-bp153.2.3.1.s390x", "SUSE Package Hub 15 SP3:libredwg-tools-0.12.5-bp153.2.3.1.x86_64", "SUSE Package Hub 15 SP3:libredwg0-0.12.5-bp153.2.3.1.aarch64", "SUSE Package Hub 15 SP3:libredwg0-0.12.5-bp153.2.3.1.i586", "SUSE Package Hub 15 SP3:libredwg0-0.12.5-bp153.2.3.1.ppc64le", "SUSE Package Hub 15 SP3:libredwg0-0.12.5-bp153.2.3.1.s390x", "SUSE Package Hub 15 SP3:libredwg0-0.12.5-bp153.2.3.1.x86_64", "openSUSE Leap 15.3:cargo1.56-1.56.1-150300.7.6.1.aarch64", "openSUSE Leap 15.3:cargo1.56-1.56.1-150300.7.6.1.ppc64le", "openSUSE Leap 15.3:cargo1.56-1.56.1-150300.7.6.1.s390x", "openSUSE Leap 15.3:cargo1.56-1.56.1-150300.7.6.1.x86_64", "openSUSE Leap 15.3:libredwg-devel-0.12.5-bp153.2.3.1.aarch64", "openSUSE Leap 15.3:libredwg-devel-0.12.5-bp153.2.3.1.i586", "openSUSE Leap 15.3:libredwg-devel-0.12.5-bp153.2.3.1.ppc64le", "openSUSE Leap 15.3:libredwg-devel-0.12.5-bp153.2.3.1.s390x", "openSUSE Leap 15.3:libredwg-devel-0.12.5-bp153.2.3.1.x86_64", "openSUSE Leap 15.3:libredwg-tools-0.12.5-bp153.2.3.1.aarch64", "openSUSE Leap 15.3:libredwg-tools-0.12.5-bp153.2.3.1.i586", "openSUSE Leap 15.3:libredwg-tools-0.12.5-bp153.2.3.1.ppc64le", "openSUSE Leap 15.3:libredwg-tools-0.12.5-bp153.2.3.1.s390x", "openSUSE Leap 15.3:libredwg-tools-0.12.5-bp153.2.3.1.x86_64", "openSUSE Leap 15.3:libredwg0-0.12.5-bp153.2.3.1.aarch64", "openSUSE Leap 15.3:libredwg0-0.12.5-bp153.2.3.1.i586", "openSUSE Leap 15.3:libredwg0-0.12.5-bp153.2.3.1.ppc64le", "openSUSE Leap 15.3:libredwg0-0.12.5-bp153.2.3.1.s390x", "openSUSE Leap 15.3:libredwg0-0.12.5-bp153.2.3.1.x86_64", "openSUSE Leap 15.3:rust1.56-1.56.1-150300.7.6.1.aarch64", "openSUSE Leap 15.3:rust1.56-1.56.1-150300.7.6.1.ppc64le", "openSUSE Leap 15.3:rust1.56-1.56.1-150300.7.6.1.s390x", "openSUSE Leap 15.3:rust1.56-1.56.1-150300.7.6.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-21658", "url": "https://www.suse.com/security/cve/CVE-2022-21658" }, { "category": "external", "summary": "SUSE Bug 1194767 for CVE-2022-21658", "url": "https://bugzilla.suse.com/1194767" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Package Hub 15 SP3:libredwg-devel-0.12.5-bp153.2.3.1.aarch64", "SUSE Package Hub 15 SP3:libredwg-devel-0.12.5-bp153.2.3.1.i586", "SUSE Package Hub 15 SP3:libredwg-devel-0.12.5-bp153.2.3.1.ppc64le", "SUSE Package Hub 15 SP3:libredwg-devel-0.12.5-bp153.2.3.1.s390x", "SUSE Package Hub 15 SP3:libredwg-devel-0.12.5-bp153.2.3.1.x86_64", "SUSE Package Hub 15 SP3:libredwg-tools-0.12.5-bp153.2.3.1.aarch64", "SUSE Package Hub 15 SP3:libredwg-tools-0.12.5-bp153.2.3.1.i586", "SUSE Package Hub 15 SP3:libredwg-tools-0.12.5-bp153.2.3.1.ppc64le", "SUSE Package Hub 15 SP3:libredwg-tools-0.12.5-bp153.2.3.1.s390x", "SUSE Package Hub 15 SP3:libredwg-tools-0.12.5-bp153.2.3.1.x86_64", "SUSE Package Hub 15 SP3:libredwg0-0.12.5-bp153.2.3.1.aarch64", "SUSE Package Hub 15 SP3:libredwg0-0.12.5-bp153.2.3.1.i586", "SUSE Package Hub 15 SP3:libredwg0-0.12.5-bp153.2.3.1.ppc64le", "SUSE Package Hub 15 SP3:libredwg0-0.12.5-bp153.2.3.1.s390x", "SUSE Package Hub 15 SP3:libredwg0-0.12.5-bp153.2.3.1.x86_64", "openSUSE Leap 15.3:cargo1.56-1.56.1-150300.7.6.1.aarch64", "openSUSE Leap 15.3:cargo1.56-1.56.1-150300.7.6.1.ppc64le", "openSUSE Leap 15.3:cargo1.56-1.56.1-150300.7.6.1.s390x", "openSUSE Leap 15.3:cargo1.56-1.56.1-150300.7.6.1.x86_64", "openSUSE Leap 15.3:libredwg-devel-0.12.5-bp153.2.3.1.aarch64", "openSUSE Leap 15.3:libredwg-devel-0.12.5-bp153.2.3.1.i586", "openSUSE Leap 15.3:libredwg-devel-0.12.5-bp153.2.3.1.ppc64le", "openSUSE Leap 15.3:libredwg-devel-0.12.5-bp153.2.3.1.s390x", "openSUSE Leap 15.3:libredwg-devel-0.12.5-bp153.2.3.1.x86_64", "openSUSE Leap 15.3:libredwg-tools-0.12.5-bp153.2.3.1.aarch64", "openSUSE Leap 15.3:libredwg-tools-0.12.5-bp153.2.3.1.i586", "openSUSE Leap 15.3:libredwg-tools-0.12.5-bp153.2.3.1.ppc64le", "openSUSE Leap 15.3:libredwg-tools-0.12.5-bp153.2.3.1.s390x", "openSUSE Leap 15.3:libredwg-tools-0.12.5-bp153.2.3.1.x86_64", "openSUSE Leap 15.3:libredwg0-0.12.5-bp153.2.3.1.aarch64", "openSUSE Leap 15.3:libredwg0-0.12.5-bp153.2.3.1.i586", "openSUSE Leap 15.3:libredwg0-0.12.5-bp153.2.3.1.ppc64le", "openSUSE Leap 15.3:libredwg0-0.12.5-bp153.2.3.1.s390x", "openSUSE Leap 15.3:libredwg0-0.12.5-bp153.2.3.1.x86_64", "openSUSE Leap 15.3:rust1.56-1.56.1-150300.7.6.1.aarch64", "openSUSE Leap 15.3:rust1.56-1.56.1-150300.7.6.1.ppc64le", "openSUSE Leap 15.3:rust1.56-1.56.1-150300.7.6.1.s390x", "openSUSE Leap 15.3:rust1.56-1.56.1-150300.7.6.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "SUSE Package Hub 15 SP3:libredwg-devel-0.12.5-bp153.2.3.1.aarch64", "SUSE Package Hub 15 SP3:libredwg-devel-0.12.5-bp153.2.3.1.i586", "SUSE Package Hub 15 SP3:libredwg-devel-0.12.5-bp153.2.3.1.ppc64le", "SUSE Package Hub 15 SP3:libredwg-devel-0.12.5-bp153.2.3.1.s390x", "SUSE Package Hub 15 SP3:libredwg-devel-0.12.5-bp153.2.3.1.x86_64", "SUSE Package Hub 15 SP3:libredwg-tools-0.12.5-bp153.2.3.1.aarch64", "SUSE Package Hub 15 SP3:libredwg-tools-0.12.5-bp153.2.3.1.i586", "SUSE Package Hub 15 SP3:libredwg-tools-0.12.5-bp153.2.3.1.ppc64le", "SUSE Package Hub 15 SP3:libredwg-tools-0.12.5-bp153.2.3.1.s390x", "SUSE Package Hub 15 SP3:libredwg-tools-0.12.5-bp153.2.3.1.x86_64", "SUSE Package Hub 15 SP3:libredwg0-0.12.5-bp153.2.3.1.aarch64", "SUSE Package Hub 15 SP3:libredwg0-0.12.5-bp153.2.3.1.i586", "SUSE Package Hub 15 SP3:libredwg0-0.12.5-bp153.2.3.1.ppc64le", "SUSE Package Hub 15 SP3:libredwg0-0.12.5-bp153.2.3.1.s390x", "SUSE Package Hub 15 SP3:libredwg0-0.12.5-bp153.2.3.1.x86_64", "openSUSE Leap 15.3:cargo1.56-1.56.1-150300.7.6.1.aarch64", "openSUSE Leap 15.3:cargo1.56-1.56.1-150300.7.6.1.ppc64le", "openSUSE Leap 15.3:cargo1.56-1.56.1-150300.7.6.1.s390x", "openSUSE Leap 15.3:cargo1.56-1.56.1-150300.7.6.1.x86_64", "openSUSE Leap 15.3:libredwg-devel-0.12.5-bp153.2.3.1.aarch64", "openSUSE Leap 15.3:libredwg-devel-0.12.5-bp153.2.3.1.i586", "openSUSE Leap 15.3:libredwg-devel-0.12.5-bp153.2.3.1.ppc64le", "openSUSE Leap 15.3:libredwg-devel-0.12.5-bp153.2.3.1.s390x", "openSUSE Leap 15.3:libredwg-devel-0.12.5-bp153.2.3.1.x86_64", "openSUSE Leap 15.3:libredwg-tools-0.12.5-bp153.2.3.1.aarch64", "openSUSE Leap 15.3:libredwg-tools-0.12.5-bp153.2.3.1.i586", "openSUSE Leap 15.3:libredwg-tools-0.12.5-bp153.2.3.1.ppc64le", "openSUSE Leap 15.3:libredwg-tools-0.12.5-bp153.2.3.1.s390x", "openSUSE Leap 15.3:libredwg-tools-0.12.5-bp153.2.3.1.x86_64", "openSUSE Leap 15.3:libredwg0-0.12.5-bp153.2.3.1.aarch64", "openSUSE Leap 15.3:libredwg0-0.12.5-bp153.2.3.1.i586", "openSUSE Leap 15.3:libredwg0-0.12.5-bp153.2.3.1.ppc64le", "openSUSE Leap 15.3:libredwg0-0.12.5-bp153.2.3.1.s390x", "openSUSE Leap 15.3:libredwg0-0.12.5-bp153.2.3.1.x86_64", "openSUSE Leap 15.3:rust1.56-1.56.1-150300.7.6.1.aarch64", "openSUSE Leap 15.3:rust1.56-1.56.1-150300.7.6.1.ppc64le", "openSUSE Leap 15.3:rust1.56-1.56.1-150300.7.6.1.s390x", "openSUSE Leap 15.3:rust1.56-1.56.1-150300.7.6.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-01-21T08:04:54Z", "details": "moderate" } ], "title": "CVE-2022-21658" } ] }
opensuse-su-2022:0171-1
Vulnerability from csaf_opensuse
Published
2022-01-25 12:56
Modified
2022-01-25 12:56
Summary
Security update for rust1.55
Notes
Title of the patch
Security update for rust1.55
Description of the patch
This update for rust1.55 fixes the following issues:
- CVE-2022-21658: Fixed race condition in std::fs::remove_dir_all (bsc#1194767).
Patchnames
openSUSE-SLE-15.3-2022-171
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for rust1.55", "title": "Title of the patch" }, { "category": "description", "text": "This update for rust1.55 fixes the following issues:\n\n- CVE-2022-21658: Fixed race condition in std::fs::remove_dir_all (bsc#1194767).\n", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-SLE-15.3-2022-171", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2022_0171-1.json" }, { "category": "self", "summary": "URL for openSUSE-SU-2022:0171-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CXNFO6HH5VY6DMGZN52EB2OJNJXKBC5H/" }, { "category": "self", "summary": "E-Mail link for openSUSE-SU-2022:0171-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CXNFO6HH5VY6DMGZN52EB2OJNJXKBC5H/" }, { "category": "self", "summary": "SUSE Bug 1194767", "url": "https://bugzilla.suse.com/1194767" }, { "category": "self", "summary": "SUSE CVE CVE-2022-21658 page", "url": "https://www.suse.com/security/cve/CVE-2022-21658/" } ], "title": "Security update for rust1.55", "tracking": { "current_release_date": "2022-01-25T12:56:24Z", "generator": { "date": "2022-01-25T12:56:24Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2022:0171-1", "initial_release_date": "2022-01-25T12:56:24Z", "revision_history": [ { "date": "2022-01-25T12:56:24Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "cargo1.55-1.55.0-150300.7.6.1.aarch64", "product": { "name": "cargo1.55-1.55.0-150300.7.6.1.aarch64", "product_id": "cargo1.55-1.55.0-150300.7.6.1.aarch64" } }, { "category": "product_version", "name": "rust1.55-1.55.0-150300.7.6.1.aarch64", "product": { "name": "rust1.55-1.55.0-150300.7.6.1.aarch64", "product_id": "rust1.55-1.55.0-150300.7.6.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "cargo1.55-1.55.0-150300.7.6.1.ppc64le", "product": { "name": "cargo1.55-1.55.0-150300.7.6.1.ppc64le", "product_id": "cargo1.55-1.55.0-150300.7.6.1.ppc64le" } }, { "category": "product_version", "name": "rust1.55-1.55.0-150300.7.6.1.ppc64le", "product": { "name": "rust1.55-1.55.0-150300.7.6.1.ppc64le", "product_id": "rust1.55-1.55.0-150300.7.6.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "cargo1.55-1.55.0-150300.7.6.1.s390x", "product": { "name": "cargo1.55-1.55.0-150300.7.6.1.s390x", "product_id": "cargo1.55-1.55.0-150300.7.6.1.s390x" } }, { "category": "product_version", "name": "rust1.55-1.55.0-150300.7.6.1.s390x", "product": { "name": "rust1.55-1.55.0-150300.7.6.1.s390x", "product_id": "rust1.55-1.55.0-150300.7.6.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "cargo1.55-1.55.0-150300.7.6.1.x86_64", "product": { "name": "cargo1.55-1.55.0-150300.7.6.1.x86_64", "product_id": "cargo1.55-1.55.0-150300.7.6.1.x86_64" } }, { "category": "product_version", "name": "rust1.55-1.55.0-150300.7.6.1.x86_64", "product": { "name": "rust1.55-1.55.0-150300.7.6.1.x86_64", "product_id": "rust1.55-1.55.0-150300.7.6.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Leap 15.3", "product": { "name": "openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3", "product_identification_helper": { "cpe": "cpe:/o:opensuse:leap:15.3" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "cargo1.55-1.55.0-150300.7.6.1.aarch64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:cargo1.55-1.55.0-150300.7.6.1.aarch64" }, "product_reference": "cargo1.55-1.55.0-150300.7.6.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "cargo1.55-1.55.0-150300.7.6.1.ppc64le as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:cargo1.55-1.55.0-150300.7.6.1.ppc64le" }, "product_reference": "cargo1.55-1.55.0-150300.7.6.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "cargo1.55-1.55.0-150300.7.6.1.s390x as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:cargo1.55-1.55.0-150300.7.6.1.s390x" }, "product_reference": "cargo1.55-1.55.0-150300.7.6.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "cargo1.55-1.55.0-150300.7.6.1.x86_64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:cargo1.55-1.55.0-150300.7.6.1.x86_64" }, "product_reference": "cargo1.55-1.55.0-150300.7.6.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "rust1.55-1.55.0-150300.7.6.1.aarch64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:rust1.55-1.55.0-150300.7.6.1.aarch64" }, "product_reference": "rust1.55-1.55.0-150300.7.6.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "rust1.55-1.55.0-150300.7.6.1.ppc64le as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:rust1.55-1.55.0-150300.7.6.1.ppc64le" }, "product_reference": "rust1.55-1.55.0-150300.7.6.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "rust1.55-1.55.0-150300.7.6.1.s390x as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:rust1.55-1.55.0-150300.7.6.1.s390x" }, "product_reference": "rust1.55-1.55.0-150300.7.6.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "rust1.55-1.55.0-150300.7.6.1.x86_64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:rust1.55-1.55.0-150300.7.6.1.x86_64" }, "product_reference": "rust1.55-1.55.0-150300.7.6.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.3" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-21658", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-21658" } ], "notes": [ { "category": "general", "text": "Rust is a multi-paradigm, general-purpose programming language designed for performance and safety, especially safe concurrency. The Rust Security Response WG was notified that the `std::fs::remove_dir_all` standard library function is vulnerable a race condition enabling symlink following (CWE-363). An attacker could use this security issue to trick a privileged program into deleting files and directories the attacker couldn\u0027t otherwise access or delete. Rust 1.0.0 through Rust 1.58.0 is affected by this vulnerability with 1.58.1 containing a patch. Note that the following build targets don\u0027t have usable APIs to properly mitigate the attack, and are thus still vulnerable even with a patched toolchain: macOS before version 10.10 (Yosemite) and REDOX. We recommend everyone to update to Rust 1.58.1 as soon as possible, especially people developing programs expected to run in privileged contexts (including system daemons and setuid binaries), as those have the highest risk of being affected by this. Note that adding checks in your codebase before calling remove_dir_all will not mitigate the vulnerability, as they would also be vulnerable to race conditions like remove_dir_all itself. The existing mitigation is working as intended outside of race conditions.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.3:cargo1.55-1.55.0-150300.7.6.1.aarch64", "openSUSE Leap 15.3:cargo1.55-1.55.0-150300.7.6.1.ppc64le", "openSUSE Leap 15.3:cargo1.55-1.55.0-150300.7.6.1.s390x", "openSUSE Leap 15.3:cargo1.55-1.55.0-150300.7.6.1.x86_64", "openSUSE Leap 15.3:rust1.55-1.55.0-150300.7.6.1.aarch64", "openSUSE Leap 15.3:rust1.55-1.55.0-150300.7.6.1.ppc64le", "openSUSE Leap 15.3:rust1.55-1.55.0-150300.7.6.1.s390x", "openSUSE Leap 15.3:rust1.55-1.55.0-150300.7.6.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-21658", "url": "https://www.suse.com/security/cve/CVE-2022-21658" }, { "category": "external", "summary": "SUSE Bug 1194767 for CVE-2022-21658", "url": "https://bugzilla.suse.com/1194767" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.3:cargo1.55-1.55.0-150300.7.6.1.aarch64", "openSUSE Leap 15.3:cargo1.55-1.55.0-150300.7.6.1.ppc64le", "openSUSE Leap 15.3:cargo1.55-1.55.0-150300.7.6.1.s390x", "openSUSE Leap 15.3:cargo1.55-1.55.0-150300.7.6.1.x86_64", "openSUSE Leap 15.3:rust1.55-1.55.0-150300.7.6.1.aarch64", "openSUSE Leap 15.3:rust1.55-1.55.0-150300.7.6.1.ppc64le", "openSUSE Leap 15.3:rust1.55-1.55.0-150300.7.6.1.s390x", "openSUSE Leap 15.3:rust1.55-1.55.0-150300.7.6.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "openSUSE Leap 15.3:cargo1.55-1.55.0-150300.7.6.1.aarch64", "openSUSE Leap 15.3:cargo1.55-1.55.0-150300.7.6.1.ppc64le", "openSUSE Leap 15.3:cargo1.55-1.55.0-150300.7.6.1.s390x", "openSUSE Leap 15.3:cargo1.55-1.55.0-150300.7.6.1.x86_64", "openSUSE Leap 15.3:rust1.55-1.55.0-150300.7.6.1.aarch64", "openSUSE Leap 15.3:rust1.55-1.55.0-150300.7.6.1.ppc64le", "openSUSE Leap 15.3:rust1.55-1.55.0-150300.7.6.1.s390x", "openSUSE Leap 15.3:rust1.55-1.55.0-150300.7.6.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-01-25T12:56:24Z", "details": "moderate" } ], "title": "CVE-2022-21658" } ] }
opensuse-su-2024:11768-1
Vulnerability from csaf_opensuse
Published
2024-06-15 00:00
Modified
2024-06-15 00:00
Summary
cargo1.57-1.57.0-3.1 on GA media
Notes
Title of the patch
cargo1.57-1.57.0-3.1 on GA media
Description of the patch
These are all security issues fixed in the cargo1.57-1.57.0-3.1 package on the GA media of openSUSE Tumbleweed.
Patchnames
openSUSE-Tumbleweed-2024-11768
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "cargo1.57-1.57.0-3.1 on GA media", "title": "Title of the patch" }, { "category": "description", "text": "These are all security issues fixed in the cargo1.57-1.57.0-3.1 package on the GA media of openSUSE Tumbleweed.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-Tumbleweed-2024-11768", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_11768-1.json" }, { "category": "self", "summary": "SUSE CVE CVE-2022-21658 page", "url": "https://www.suse.com/security/cve/CVE-2022-21658/" } ], "title": "cargo1.57-1.57.0-3.1 on GA media", "tracking": { "current_release_date": "2024-06-15T00:00:00Z", "generator": { "date": "2024-06-15T00:00:00Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2024:11768-1", "initial_release_date": "2024-06-15T00:00:00Z", "revision_history": [ { "date": "2024-06-15T00:00:00Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "cargo1.57-1.57.0-3.1.aarch64", "product": { "name": "cargo1.57-1.57.0-3.1.aarch64", "product_id": "cargo1.57-1.57.0-3.1.aarch64" } }, { "category": "product_version", "name": "rust1.57-1.57.0-3.1.aarch64", "product": { "name": "rust1.57-1.57.0-3.1.aarch64", "product_id": "rust1.57-1.57.0-3.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "cargo1.57-1.57.0-3.1.ppc64le", "product": { "name": "cargo1.57-1.57.0-3.1.ppc64le", "product_id": "cargo1.57-1.57.0-3.1.ppc64le" } }, { "category": "product_version", "name": "rust1.57-1.57.0-3.1.ppc64le", "product": { "name": "rust1.57-1.57.0-3.1.ppc64le", "product_id": "rust1.57-1.57.0-3.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "cargo1.57-1.57.0-3.1.s390x", "product": { "name": "cargo1.57-1.57.0-3.1.s390x", "product_id": "cargo1.57-1.57.0-3.1.s390x" } }, { "category": "product_version", "name": "rust1.57-1.57.0-3.1.s390x", "product": { "name": "rust1.57-1.57.0-3.1.s390x", "product_id": "rust1.57-1.57.0-3.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "cargo1.57-1.57.0-3.1.x86_64", "product": { "name": "cargo1.57-1.57.0-3.1.x86_64", "product_id": "cargo1.57-1.57.0-3.1.x86_64" } }, { "category": "product_version", "name": "rust1.57-1.57.0-3.1.x86_64", "product": { "name": "rust1.57-1.57.0-3.1.x86_64", "product_id": "rust1.57-1.57.0-3.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Tumbleweed", "product": { "name": "openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed", "product_identification_helper": { "cpe": "cpe:/o:opensuse:tumbleweed" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "cargo1.57-1.57.0-3.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:cargo1.57-1.57.0-3.1.aarch64" }, "product_reference": "cargo1.57-1.57.0-3.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "cargo1.57-1.57.0-3.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:cargo1.57-1.57.0-3.1.ppc64le" }, "product_reference": "cargo1.57-1.57.0-3.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "cargo1.57-1.57.0-3.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:cargo1.57-1.57.0-3.1.s390x" }, "product_reference": "cargo1.57-1.57.0-3.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "cargo1.57-1.57.0-3.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:cargo1.57-1.57.0-3.1.x86_64" }, "product_reference": "cargo1.57-1.57.0-3.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "rust1.57-1.57.0-3.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:rust1.57-1.57.0-3.1.aarch64" }, "product_reference": "rust1.57-1.57.0-3.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "rust1.57-1.57.0-3.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:rust1.57-1.57.0-3.1.ppc64le" }, "product_reference": "rust1.57-1.57.0-3.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "rust1.57-1.57.0-3.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:rust1.57-1.57.0-3.1.s390x" }, "product_reference": "rust1.57-1.57.0-3.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "rust1.57-1.57.0-3.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:rust1.57-1.57.0-3.1.x86_64" }, "product_reference": "rust1.57-1.57.0-3.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-21658", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-21658" } ], "notes": [ { "category": "general", "text": "Rust is a multi-paradigm, general-purpose programming language designed for performance and safety, especially safe concurrency. The Rust Security Response WG was notified that the `std::fs::remove_dir_all` standard library function is vulnerable a race condition enabling symlink following (CWE-363). An attacker could use this security issue to trick a privileged program into deleting files and directories the attacker couldn\u0027t otherwise access or delete. Rust 1.0.0 through Rust 1.58.0 is affected by this vulnerability with 1.58.1 containing a patch. Note that the following build targets don\u0027t have usable APIs to properly mitigate the attack, and are thus still vulnerable even with a patched toolchain: macOS before version 10.10 (Yosemite) and REDOX. We recommend everyone to update to Rust 1.58.1 as soon as possible, especially people developing programs expected to run in privileged contexts (including system daemons and setuid binaries), as those have the highest risk of being affected by this. Note that adding checks in your codebase before calling remove_dir_all will not mitigate the vulnerability, as they would also be vulnerable to race conditions like remove_dir_all itself. The existing mitigation is working as intended outside of race conditions.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:cargo1.57-1.57.0-3.1.aarch64", "openSUSE Tumbleweed:cargo1.57-1.57.0-3.1.ppc64le", "openSUSE Tumbleweed:cargo1.57-1.57.0-3.1.s390x", "openSUSE Tumbleweed:cargo1.57-1.57.0-3.1.x86_64", "openSUSE Tumbleweed:rust1.57-1.57.0-3.1.aarch64", "openSUSE Tumbleweed:rust1.57-1.57.0-3.1.ppc64le", "openSUSE Tumbleweed:rust1.57-1.57.0-3.1.s390x", "openSUSE Tumbleweed:rust1.57-1.57.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-21658", "url": "https://www.suse.com/security/cve/CVE-2022-21658" }, { "category": "external", "summary": "SUSE Bug 1194767 for CVE-2022-21658", "url": "https://bugzilla.suse.com/1194767" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:cargo1.57-1.57.0-3.1.aarch64", "openSUSE Tumbleweed:cargo1.57-1.57.0-3.1.ppc64le", "openSUSE Tumbleweed:cargo1.57-1.57.0-3.1.s390x", "openSUSE Tumbleweed:cargo1.57-1.57.0-3.1.x86_64", "openSUSE Tumbleweed:rust1.57-1.57.0-3.1.aarch64", "openSUSE Tumbleweed:rust1.57-1.57.0-3.1.ppc64le", "openSUSE Tumbleweed:rust1.57-1.57.0-3.1.s390x", "openSUSE Tumbleweed:rust1.57-1.57.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:cargo1.57-1.57.0-3.1.aarch64", "openSUSE Tumbleweed:cargo1.57-1.57.0-3.1.ppc64le", "openSUSE Tumbleweed:cargo1.57-1.57.0-3.1.s390x", "openSUSE Tumbleweed:cargo1.57-1.57.0-3.1.x86_64", "openSUSE Tumbleweed:rust1.57-1.57.0-3.1.aarch64", "openSUSE Tumbleweed:rust1.57-1.57.0-3.1.ppc64le", "openSUSE Tumbleweed:rust1.57-1.57.0-3.1.s390x", "openSUSE Tumbleweed:rust1.57-1.57.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2022-21658" } ] }
opensuse-su-2022:0491-1
Vulnerability from csaf_opensuse
Published
2022-02-18 09:29
Modified
2022-02-18 09:29
Summary
Security update for rust
Notes
Title of the patch
Security update for rust
Description of the patch
This update for rust fixes the following issues:
- CVE-2022-21658: Fixed race condition in std::fs::remove_dir_all (bsc#1194767).
Patchnames
openSUSE-SLE-15.3-2022-491,openSUSE-SLE-15.4-2022-491
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for rust", "title": "Title of the patch" }, { "category": "description", "text": "This update for rust fixes the following issues:\n\n- CVE-2022-21658: Fixed race condition in std::fs::remove_dir_all (bsc#1194767).\n", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-SLE-15.3-2022-491,openSUSE-SLE-15.4-2022-491", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2022_0491-1.json" }, { "category": "self", "summary": "URL for openSUSE-SU-2022:0491-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EL7GUT2ZSPRSFN52THPCRG67APLUTSL7/" }, { "category": "self", "summary": "E-Mail link for openSUSE-SU-2022:0491-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EL7GUT2ZSPRSFN52THPCRG67APLUTSL7/" }, { "category": "self", "summary": "SUSE Bug 1194767", "url": "https://bugzilla.suse.com/1194767" }, { "category": "self", "summary": "SUSE CVE CVE-2022-21658 page", "url": "https://www.suse.com/security/cve/CVE-2022-21658/" } ], "title": "Security update for rust", "tracking": { "current_release_date": "2022-02-18T09:29:34Z", "generator": { "date": "2022-02-18T09:29:34Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2022:0491-1", "initial_release_date": "2022-02-18T09:29:34Z", "revision_history": [ { "date": "2022-02-18T09:29:34Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "rust-analysis-1.53.0-22.1.aarch64", "product": { "name": "rust-analysis-1.53.0-22.1.aarch64", "product_id": "rust-analysis-1.53.0-22.1.aarch64" } }, { "category": "product_version", "name": "rust-doc-1.53.0-22.1.aarch64", "product": { "name": "rust-doc-1.53.0-22.1.aarch64", "product_id": "rust-doc-1.53.0-22.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "cargo-doc-1.53.0-22.1.noarch", "product": { "name": "cargo-doc-1.53.0-22.1.noarch", "product_id": "cargo-doc-1.53.0-22.1.noarch" } }, { "category": "product_version", "name": "rust-src-1.53.0-22.1.noarch", "product": { "name": "rust-src-1.53.0-22.1.noarch", "product_id": "rust-src-1.53.0-22.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "rust-analysis-1.53.0-22.1.x86_64", "product": { "name": "rust-analysis-1.53.0-22.1.x86_64", "product_id": "rust-analysis-1.53.0-22.1.x86_64" } }, { "category": "product_version", "name": "rust-doc-1.53.0-22.1.x86_64", "product": { "name": "rust-doc-1.53.0-22.1.x86_64", "product_id": "rust-doc-1.53.0-22.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Leap 15.3", "product": { "name": "openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3", "product_identification_helper": { "cpe": "cpe:/o:opensuse:leap:15.3" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "cargo-doc-1.53.0-22.1.noarch as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:cargo-doc-1.53.0-22.1.noarch" }, "product_reference": "cargo-doc-1.53.0-22.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "rust-analysis-1.53.0-22.1.aarch64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:rust-analysis-1.53.0-22.1.aarch64" }, "product_reference": "rust-analysis-1.53.0-22.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "rust-analysis-1.53.0-22.1.x86_64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:rust-analysis-1.53.0-22.1.x86_64" }, "product_reference": "rust-analysis-1.53.0-22.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "rust-doc-1.53.0-22.1.aarch64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:rust-doc-1.53.0-22.1.aarch64" }, "product_reference": "rust-doc-1.53.0-22.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "rust-doc-1.53.0-22.1.x86_64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:rust-doc-1.53.0-22.1.x86_64" }, "product_reference": "rust-doc-1.53.0-22.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "rust-src-1.53.0-22.1.noarch as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:rust-src-1.53.0-22.1.noarch" }, "product_reference": "rust-src-1.53.0-22.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.3" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-21658", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-21658" } ], "notes": [ { "category": "general", "text": "Rust is a multi-paradigm, general-purpose programming language designed for performance and safety, especially safe concurrency. The Rust Security Response WG was notified that the `std::fs::remove_dir_all` standard library function is vulnerable a race condition enabling symlink following (CWE-363). An attacker could use this security issue to trick a privileged program into deleting files and directories the attacker couldn\u0027t otherwise access or delete. Rust 1.0.0 through Rust 1.58.0 is affected by this vulnerability with 1.58.1 containing a patch. Note that the following build targets don\u0027t have usable APIs to properly mitigate the attack, and are thus still vulnerable even with a patched toolchain: macOS before version 10.10 (Yosemite) and REDOX. We recommend everyone to update to Rust 1.58.1 as soon as possible, especially people developing programs expected to run in privileged contexts (including system daemons and setuid binaries), as those have the highest risk of being affected by this. Note that adding checks in your codebase before calling remove_dir_all will not mitigate the vulnerability, as they would also be vulnerable to race conditions like remove_dir_all itself. The existing mitigation is working as intended outside of race conditions.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.3:cargo-doc-1.53.0-22.1.noarch", "openSUSE Leap 15.3:rust-analysis-1.53.0-22.1.aarch64", "openSUSE Leap 15.3:rust-analysis-1.53.0-22.1.x86_64", "openSUSE Leap 15.3:rust-doc-1.53.0-22.1.aarch64", "openSUSE Leap 15.3:rust-doc-1.53.0-22.1.x86_64", "openSUSE Leap 15.3:rust-src-1.53.0-22.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2022-21658", "url": "https://www.suse.com/security/cve/CVE-2022-21658" }, { "category": "external", "summary": "SUSE Bug 1194767 for CVE-2022-21658", "url": "https://bugzilla.suse.com/1194767" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.3:cargo-doc-1.53.0-22.1.noarch", "openSUSE Leap 15.3:rust-analysis-1.53.0-22.1.aarch64", "openSUSE Leap 15.3:rust-analysis-1.53.0-22.1.x86_64", "openSUSE Leap 15.3:rust-doc-1.53.0-22.1.aarch64", "openSUSE Leap 15.3:rust-doc-1.53.0-22.1.x86_64", "openSUSE Leap 15.3:rust-src-1.53.0-22.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "openSUSE Leap 15.3:cargo-doc-1.53.0-22.1.noarch", "openSUSE Leap 15.3:rust-analysis-1.53.0-22.1.aarch64", "openSUSE Leap 15.3:rust-analysis-1.53.0-22.1.x86_64", "openSUSE Leap 15.3:rust-doc-1.53.0-22.1.aarch64", "openSUSE Leap 15.3:rust-doc-1.53.0-22.1.x86_64", "openSUSE Leap 15.3:rust-src-1.53.0-22.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2022-02-18T09:29:34Z", "details": "moderate" } ], "title": "CVE-2022-21658" } ] }
suse-su-2022:0843-1
Vulnerability from csaf_suse
Published
2022-03-15 10:33
Modified
2022-03-15 10:33
Summary
Security update for rust, rust1.58, rust1.59
Notes
Title of the patch
Security update for rust, rust1.58, rust1.59
Description of the patch
This update for rust, rust1.58, rust1.59 fixes the following issues:
This update provides both rust1.58 and rust1.59.
Changes in rust1.58:
- Add recommends for GCC for installs to be able to link.
- Add suggests for lld/clang which are faster than gcc for linking to
allow users choice on what they use.
- CVE-2022-21658: Resolve race condition in std::fs::remove_dir_all (bsc#1194767)
Version 1.58.0 (2022-01-13)
==========================
Language
--------
- [Format strings can now capture arguments simply by writing `{ident}` in the string.][90473] This works in all macros accepting format strings. Support for this in `panic!` (`panic!('{ident}')`) requires the 2021 edition; panic invocations in previous editions that appear to be trying to use this will result in a warning lint about not having the intended effect.
- [`*const T` pointers can now be dereferenced in const contexts.][89551]
- [The rules for when a generic struct implements `Unsize` have been relaxed.][90417]
Compiler
--------
- [Add LLVM CFI support to the Rust compiler][89652]
- [Stabilize -Z strip as -C strip][90058]. Note that while release builds already don't add debug symbols for the code you compile, the compiled standard library that ships with Rust includes debug symbols, so you may want to use the `strip` option to remove these symbols to produce smaller release binaries. Note that this release only includes support in rustc, not directly in cargo.
- [Add support for LLVM coverage mapping format versions 5 and 6][91207]
- [Emit LLVM optimization remarks when enabled with `-Cremark`][90833]
- [Update the minimum external LLVM to 12][90175]
- [Add `x86_64-unknown-none` at Tier 3*][89062]
- [Build musl dist artifacts with debuginfo enabled][90733]. When building release binaries using musl, you may want to use the newly stabilized strip option to remove these debug symbols, reducing the size of your binaries.
- [Don't abort compilation after giving a lint error][87337]
- [Error messages point at the source of trait bound obligations in more places][89580]
\* Refer to Rust's [platform support page][platform-support-doc] for more
information on Rust's tiered platform support.
Libraries
---------
- [All remaining functions in the standard library have `#[must_use]` annotations where appropriate][89692], producing a warning when ignoring their return value. This helps catch mistakes such as expecting a function to mutate a value in place rather than return a new value.
- [Paths are automatically canonicalized on Windows for operations that support it][89174]
- [Re-enable debug checks for `copy` and `copy_nonoverlapping`][90041]
- [Implement `RefUnwindSafe` for `Rc<T>`][87467]
- [Make RSplit<T, P>: Clone not require T: Clone][90117]
- [Implement `Termination` for `Result<Infallible, E>`][88601]. This allows writing `fn main() -> Result<Infallible, ErrorType>`, for a program whose successful exits never involve returning from `main` (for instance, a program that calls `exit`, or that uses `exec` to run another program).
Stabilized APIs
---------------
- [`Metadata::is_symlink`]
- [`Path::is_symlink`]
- [`{integer}::saturating_div`]
- [`Option::unwrap_unchecked`]
- [`Result::unwrap_unchecked`]
- [`Result::unwrap_err_unchecked`]
- [`NonZero{unsigned}::is_power_of_two`]
- [`File::options`]
These APIs are now usable in const contexts:
- [`Duration::new`]
- [`Duration::checked_add`]
- [`Duration::saturating_add`]
- [`Duration::checked_sub`]
- [`Duration::saturating_sub`]
- [`Duration::checked_mul`]
- [`Duration::saturating_mul`]
- [`Duration::checked_div`]
- [`MaybeUninit::as_ptr`]
- [`MaybeUninit::as_mut_ptr`]
- [`MaybeUninit::assume_init`]
- [`MaybeUninit::assume_init_ref`]
Cargo
-----
- [Add --message-format for install command][cargo/10107]
- [Warn when alias shadows external subcommand][cargo/10082]
Rustdoc
-------
- [Show all Deref implementations recursively in rustdoc][90183]
- [Use computed visibility in rustdoc][88447]
Compatibility Notes
-------------------
- [Try all stable method candidates first before trying unstable ones][90329]. This change ensures that adding new nightly-only methods to the Rust standard library will not break code invoking methods of the same name from traits outside the standard library.
- Windows: [`std::process::Command` will no longer search the current directory for executables.][87704]
- [All proc-macro backward-compatibility lints are now deny-by-default.][88041]
- [proc_macro: Append .0 to unsuffixed float if it would otherwise become int token][90297]
- [Refactor weak symbols in std::sys::unix][90846]. This optimizes accesses to glibc functions, by avoiding the use of dlopen. This does not increase the [minimum expected version of glibc](https://doc.rust-lang.org/nightly/rustc/platform-support.html). However, software distributions that use symbol versions to detect library dependencies, and which take weak symbols into account in that analysis, may detect rust binaries as requiring newer versions of glibc.
- [rustdoc now rejects some unexpected semicolons in doctests][91026]
Version 1.59.0 (2022-02-24)
==========================
Language
--------
- [Stabilize default arguments for const generics][90207]
- [Stabilize destructuring assignment][90521]
- [Relax private in public lint on generic bounds and where clauses of trait impls][90586]
- [Stabilize asm! and global_asm! for x86, x86_64, ARM, Aarch64, and RISC-V][91728]
Compiler
--------
- [Stabilize new symbol mangling format, leaving it opt-in (-Csymbol-mangling-version=v0)][90128]
- [Emit LLVM optimization remarks when enabled with `-Cremark`][90833]
- [Fix sparc64 ABI for aggregates with floating point members][91003]
- [Warn when a `#[test]`-like built-in attribute macro is present multiple times.][91172]
- [Add support for riscv64gc-unknown-freebsd][91284]
- [Stabilize `-Z emit-future-incompat` as `--json future-incompat`][91535]
Libraries
---------
- [Remove unnecessary bounds for some Hash{Map,Set} methods][91593]
Stabilized APIs
---------------
- [`std::thread::available_parallelism`][available_parallelism]
- [`Result::copied`][result-copied]
- [`Result::cloned`][result-cloned]
- [`arch::asm!`][asm]
- [`arch::global_asm!`][global_asm]
- [`ops::ControlFlow::is_break`][is_break]
- [`ops::ControlFlow::is_continue`][is_continue]
- [`TryFrom<char> for u8`][try_from_char_u8]
- [`char::TryFromCharError`][try_from_char_err]
implementing `Clone`, `Debug`, `Display`, `PartialEq`, `Copy`, `Eq`, `Error`
- [`iter::zip`][zip]
- [`NonZeroU8::is_power_of_two`][is_power_of_two8]
- [`NonZeroU16::is_power_of_two`][is_power_of_two16]
- [`NonZeroU32::is_power_of_two`][is_power_of_two32]
- [`NonZeroU64::is_power_of_two`][is_power_of_two64]
- [`NonZeroU128::is_power_of_two`][is_power_of_two128]
- [`DoubleEndedIterator for ToLowercase`][lowercase]
- [`DoubleEndedIterator for ToUppercase`][uppercase]
- [`TryFrom<&mut [T]> for [T; N]`][tryfrom_ref_arr]
- [`UnwindSafe for Once`][unwindsafe_once]
- [`RefUnwindSafe for Once`][refunwindsafe_once]
- [armv8 neon intrinsics for aarch64][stdarch/1266]
Const-stable:
- [`mem::MaybeUninit::as_ptr`][muninit_ptr]
- [`mem::MaybeUninit::assume_init`][muninit_init]
- [`mem::MaybeUninit::assume_init_ref`][muninit_init_ref]
- [`ffi::CStr::from_bytes_with_nul_unchecked`][cstr_from_bytes]
Cargo
-----
- [Stabilize the `strip` profile option][cargo/10088]
- [Stabilize future-incompat-report][cargo/10165]
- [Support abbreviating `--release` as `-r`][cargo/10133]
- [Support `term.quiet` configuration][cargo/10152]
- [Remove `--host` from cargo {publish,search,login}][cargo/10145]
Compatibility Notes
-------------------
- [Refactor weak symbols in std::sys::unix][90846]
This may add new, versioned, symbols when building with a newer glibc, as the
standard library uses weak linkage rather than dynamically attempting to load
certain symbols at runtime.
- [Deprecate crate_type and crate_name nested inside `#![cfg_attr]`][83744]
This adds a future compatibility lint to supporting the use of cfg_attr
wrapping either crate_type or crate_name specification within Rust files;
it is recommended that users migrate to setting the equivalent command line
flags.
- [Remove effect of `#[no_link]` attribute on name resolution][92034]
This may expose new names, leading to conflicts with preexisting names in a
given namespace and a compilation failure.
- [Cargo will document libraries before binaries.][cargo/10172]
- [Respect doc=false in dependencies, not just the root crate][cargo/10201]
- [Weaken guarantee around advancing underlying iterators in zip][83791]
- [Make split_inclusive() on an empty slice yield an empty output][89825]
- [Update std::env::temp_dir to use GetTempPath2 on Windows when available.][89999]
Changes in rust wrapper package:
- Update to version 1.59.0 - for details see the rust1.59 package
- Update package description to help users choose what tooling
to install.
- Provide rust+cargo by cargo: all cargo<n> package provide this
symbol too. Having the meta package provide it allows OBS to have
a generic prefernece on the meta package for all packages 'just'
requiring rust+cargo.
- Update to version 1.58.0
Patchnames
SUSE-2022-843,SUSE-SLE-Module-Development-Tools-15-SP3-2022-843
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for rust, rust1.58, rust1.59", "title": "Title of the patch" }, { "category": "description", "text": "This update for rust, rust1.58, rust1.59 fixes the following issues:\n\nThis update provides both rust1.58 and rust1.59.\n\nChanges in rust1.58:\n\n- Add recommends for GCC for installs to be able to link.\n- Add suggests for lld/clang which are faster than gcc for linking to\n allow users choice on what they use.\n- CVE-2022-21658: Resolve race condition in std::fs::remove_dir_all (bsc#1194767)\n\nVersion 1.58.0 (2022-01-13)\n==========================\n\nLanguage\n--------\n- [Format strings can now capture arguments simply by writing `{ident}` in the string.][90473] This works in all macros accepting format strings. Support for this in `panic!` (`panic!(\u0027{ident}\u0027)`) requires the 2021 edition; panic invocations in previous editions that appear to be trying to use this will result in a warning lint about not having the intended effect.\n- [`*const T` pointers can now be dereferenced in const contexts.][89551]\n- [The rules for when a generic struct implements `Unsize` have been relaxed.][90417]\nCompiler\n--------\n- [Add LLVM CFI support to the Rust compiler][89652]\n- [Stabilize -Z strip as -C strip][90058]. Note that while release builds already don\u0027t add debug symbols for the code you compile, the compiled standard library that ships with Rust includes debug symbols, so you may want to use the `strip` option to remove these symbols to produce smaller release binaries. Note that this release only includes support in rustc, not directly in cargo.\n- [Add support for LLVM coverage mapping format versions 5 and 6][91207]\n- [Emit LLVM optimization remarks when enabled with `-Cremark`][90833]\n- [Update the minimum external LLVM to 12][90175]\n- [Add `x86_64-unknown-none` at Tier 3*][89062]\n- [Build musl dist artifacts with debuginfo enabled][90733]. When building release binaries using musl, you may want to use the newly stabilized strip option to remove these debug symbols, reducing the size of your binaries.\n- [Don\u0027t abort compilation after giving a lint error][87337]\n- [Error messages point at the source of trait bound obligations in more places][89580]\n\\* Refer to Rust\u0027s [platform support page][platform-support-doc] for more\n information on Rust\u0027s tiered platform support.\n\nLibraries\n---------\n\n- [All remaining functions in the standard library have `#[must_use]` annotations where appropriate][89692], producing a warning when ignoring their return value. This helps catch mistakes such as expecting a function to mutate a value in place rather than return a new value.\n- [Paths are automatically canonicalized on Windows for operations that support it][89174]\n- [Re-enable debug checks for `copy` and `copy_nonoverlapping`][90041]\n- [Implement `RefUnwindSafe` for `Rc\u003cT\u003e`][87467]\n- [Make RSplit\u003cT, P\u003e: Clone not require T: Clone][90117]\n- [Implement `Termination` for `Result\u003cInfallible, E\u003e`][88601]. This allows writing `fn main() -\u003e Result\u003cInfallible, ErrorType\u003e`, for a program whose successful exits never involve returning from `main` (for instance, a program that calls `exit`, or that uses `exec` to run another program).\n\nStabilized APIs\n---------------\n\n- [`Metadata::is_symlink`]\n- [`Path::is_symlink`]\n- [`{integer}::saturating_div`]\n- [`Option::unwrap_unchecked`]\n- [`Result::unwrap_unchecked`]\n- [`Result::unwrap_err_unchecked`]\n- [`NonZero{unsigned}::is_power_of_two`]\n- [`File::options`]\nThese APIs are now usable in const contexts:\n- [`Duration::new`]\n- [`Duration::checked_add`]\n- [`Duration::saturating_add`]\n- [`Duration::checked_sub`]\n- [`Duration::saturating_sub`]\n- [`Duration::checked_mul`]\n- [`Duration::saturating_mul`]\n- [`Duration::checked_div`]\n- [`MaybeUninit::as_ptr`]\n- [`MaybeUninit::as_mut_ptr`]\n- [`MaybeUninit::assume_init`]\n- [`MaybeUninit::assume_init_ref`]\n\nCargo\n-----\n\n- [Add --message-format for install command][cargo/10107]\n- [Warn when alias shadows external subcommand][cargo/10082]\n\nRustdoc\n-------\n\n- [Show all Deref implementations recursively in rustdoc][90183]\n- [Use computed visibility in rustdoc][88447]\n\nCompatibility Notes\n-------------------\n\n- [Try all stable method candidates first before trying unstable ones][90329]. This change ensures that adding new nightly-only methods to the Rust standard library will not break code invoking methods of the same name from traits outside the standard library.\n- Windows: [`std::process::Command` will no longer search the current directory for executables.][87704]\n- [All proc-macro backward-compatibility lints are now deny-by-default.][88041]\n- [proc_macro: Append .0 to unsuffixed float if it would otherwise become int token][90297]\n- [Refactor weak symbols in std::sys::unix][90846]. This optimizes accesses to glibc functions, by avoiding the use of dlopen. This does not increase the [minimum expected version of glibc](https://doc.rust-lang.org/nightly/rustc/platform-support.html). However, software distributions that use symbol versions to detect library dependencies, and which take weak symbols into account in that analysis, may detect rust binaries as requiring newer versions of glibc.\n- [rustdoc now rejects some unexpected semicolons in doctests][91026]\n\nVersion 1.59.0 (2022-02-24)\n==========================\n\nLanguage\n--------\n\n- [Stabilize default arguments for const generics][90207]\n- [Stabilize destructuring assignment][90521]\n- [Relax private in public lint on generic bounds and where clauses of trait impls][90586]\n- [Stabilize asm! and global_asm! for x86, x86_64, ARM, Aarch64, and RISC-V][91728]\n\nCompiler\n--------\n\n- [Stabilize new symbol mangling format, leaving it opt-in (-Csymbol-mangling-version=v0)][90128]\n- [Emit LLVM optimization remarks when enabled with `-Cremark`][90833]\n- [Fix sparc64 ABI for aggregates with floating point members][91003]\n- [Warn when a `#[test]`-like built-in attribute macro is present multiple times.][91172]\n- [Add support for riscv64gc-unknown-freebsd][91284]\n- [Stabilize `-Z emit-future-incompat` as `--json future-incompat`][91535]\n\nLibraries\n---------\n\n- [Remove unnecessary bounds for some Hash{Map,Set} methods][91593]\n\nStabilized APIs\n---------------\n\n- [`std::thread::available_parallelism`][available_parallelism]\n- [`Result::copied`][result-copied]\n- [`Result::cloned`][result-cloned]\n- [`arch::asm!`][asm]\n- [`arch::global_asm!`][global_asm]\n- [`ops::ControlFlow::is_break`][is_break]\n- [`ops::ControlFlow::is_continue`][is_continue]\n- [`TryFrom\u003cchar\u003e for u8`][try_from_char_u8]\n- [`char::TryFromCharError`][try_from_char_err]\n implementing `Clone`, `Debug`, `Display`, `PartialEq`, `Copy`, `Eq`, `Error`\n- [`iter::zip`][zip]\n- [`NonZeroU8::is_power_of_two`][is_power_of_two8]\n- [`NonZeroU16::is_power_of_two`][is_power_of_two16]\n- [`NonZeroU32::is_power_of_two`][is_power_of_two32]\n- [`NonZeroU64::is_power_of_two`][is_power_of_two64]\n- [`NonZeroU128::is_power_of_two`][is_power_of_two128]\n- [`DoubleEndedIterator for ToLowercase`][lowercase]\n- [`DoubleEndedIterator for ToUppercase`][uppercase]\n- [`TryFrom\u003c\u0026mut [T]\u003e for [T; N]`][tryfrom_ref_arr]\n- [`UnwindSafe for Once`][unwindsafe_once]\n- [`RefUnwindSafe for Once`][refunwindsafe_once]\n- [armv8 neon intrinsics for aarch64][stdarch/1266]\nConst-stable:\n- [`mem::MaybeUninit::as_ptr`][muninit_ptr]\n- [`mem::MaybeUninit::assume_init`][muninit_init]\n- [`mem::MaybeUninit::assume_init_ref`][muninit_init_ref]\n- [`ffi::CStr::from_bytes_with_nul_unchecked`][cstr_from_bytes]\n\nCargo\n-----\n\n- [Stabilize the `strip` profile option][cargo/10088]\n- [Stabilize future-incompat-report][cargo/10165]\n- [Support abbreviating `--release` as `-r`][cargo/10133]\n- [Support `term.quiet` configuration][cargo/10152]\n- [Remove `--host` from cargo {publish,search,login}][cargo/10145]\n\nCompatibility Notes\n-------------------\n\n- [Refactor weak symbols in std::sys::unix][90846]\n This may add new, versioned, symbols when building with a newer glibc, as the\n standard library uses weak linkage rather than dynamically attempting to load\n certain symbols at runtime.\n- [Deprecate crate_type and crate_name nested inside `#![cfg_attr]`][83744]\n This adds a future compatibility lint to supporting the use of cfg_attr\n wrapping either crate_type or crate_name specification within Rust files;\n it is recommended that users migrate to setting the equivalent command line\n flags.\n- [Remove effect of `#[no_link]` attribute on name resolution][92034]\n This may expose new names, leading to conflicts with preexisting names in a\n given namespace and a compilation failure.\n- [Cargo will document libraries before binaries.][cargo/10172]\n- [Respect doc=false in dependencies, not just the root crate][cargo/10201]\n- [Weaken guarantee around advancing underlying iterators in zip][83791]\n- [Make split_inclusive() on an empty slice yield an empty output][89825]\n- [Update std::env::temp_dir to use GetTempPath2 on Windows when available.][89999]\n\nChanges in rust wrapper package:\n\n- Update to version 1.59.0 - for details see the rust1.59 package\n\n- Update package description to help users choose what tooling\n to install.\n\n- Provide rust+cargo by cargo: all cargo\u003cn\u003e package provide this\n symbol too. Having the meta package provide it allows OBS to have\n a generic prefernece on the meta package for all packages \u0027just\u0027\n requiring rust+cargo.\n\n- Update to version 1.58.0\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2022-843,SUSE-SLE-Module-Development-Tools-15-SP3-2022-843", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_0843-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2022:0843-1", "url": "https://www.suse.com/support/update/announcement/2022/suse-su-20220843-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2022:0843-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-March/010441.html" }, { "category": "self", "summary": "SUSE Bug 1194767", "url": "https://bugzilla.suse.com/1194767" }, { "category": "self", "summary": "SUSE CVE CVE-2022-21658 page", "url": "https://www.suse.com/security/cve/CVE-2022-21658/" } ], "title": "Security update for rust, rust1.58, rust1.59", "tracking": { "current_release_date": "2022-03-15T10:33:49Z", "generator": { "date": "2022-03-15T10:33:49Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2022:0843-1", "initial_release_date": "2022-03-15T10:33:49Z", "revision_history": [ { "date": "2022-03-15T10:33:49Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "cargo-1.59.0-150300.21.20.1.aarch64", "product": { "name": "cargo-1.59.0-150300.21.20.1.aarch64", "product_id": "cargo-1.59.0-150300.21.20.1.aarch64" } }, { "category": "product_version", "name": "cargo1.58-1.58.0-150300.7.3.1.aarch64", "product": { "name": "cargo1.58-1.58.0-150300.7.3.1.aarch64", "product_id": "cargo1.58-1.58.0-150300.7.3.1.aarch64" } }, { "category": "product_version", "name": "cargo1.59-1.59.0-150300.7.4.2.aarch64", "product": { "name": "cargo1.59-1.59.0-150300.7.4.2.aarch64", "product_id": "cargo1.59-1.59.0-150300.7.4.2.aarch64" } }, { "category": "product_version", "name": "rust-1.59.0-150300.21.20.1.aarch64", "product": { "name": "rust-1.59.0-150300.21.20.1.aarch64", "product_id": "rust-1.59.0-150300.21.20.1.aarch64" } }, { "category": "product_version", "name": "rust1.58-1.58.0-150300.7.3.1.aarch64", "product": { "name": "rust1.58-1.58.0-150300.7.3.1.aarch64", "product_id": "rust1.58-1.58.0-150300.7.3.1.aarch64" } }, { "category": "product_version", "name": "rust1.59-1.59.0-150300.7.4.2.aarch64", "product": { "name": "rust1.59-1.59.0-150300.7.4.2.aarch64", "product_id": "rust1.59-1.59.0-150300.7.4.2.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "cargo-1.59.0-150300.21.20.1.i586", "product": { "name": "cargo-1.59.0-150300.21.20.1.i586", "product_id": "cargo-1.59.0-150300.21.20.1.i586" } }, { "category": "product_version", "name": "cargo1.58-1.58.0-150300.7.3.1.i586", "product": { "name": "cargo1.58-1.58.0-150300.7.3.1.i586", "product_id": "cargo1.58-1.58.0-150300.7.3.1.i586" } }, { "category": "product_version", "name": "cargo1.59-1.59.0-150300.7.4.2.i586", "product": { "name": "cargo1.59-1.59.0-150300.7.4.2.i586", "product_id": "cargo1.59-1.59.0-150300.7.4.2.i586" } }, { "category": "product_version", "name": "rust-1.59.0-150300.21.20.1.i586", "product": { "name": "rust-1.59.0-150300.21.20.1.i586", "product_id": "rust-1.59.0-150300.21.20.1.i586" } }, { "category": "product_version", "name": "rust1.58-1.58.0-150300.7.3.1.i586", "product": { "name": "rust1.58-1.58.0-150300.7.3.1.i586", "product_id": "rust1.58-1.58.0-150300.7.3.1.i586" } }, { "category": "product_version", "name": "rust1.59-1.59.0-150300.7.4.2.i586", "product": { "name": "rust1.59-1.59.0-150300.7.4.2.i586", "product_id": "rust1.59-1.59.0-150300.7.4.2.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "cargo-1.59.0-150300.21.20.1.ppc64le", "product": { "name": "cargo-1.59.0-150300.21.20.1.ppc64le", "product_id": "cargo-1.59.0-150300.21.20.1.ppc64le" } }, { "category": "product_version", "name": "cargo1.58-1.58.0-150300.7.3.1.ppc64le", "product": { "name": "cargo1.58-1.58.0-150300.7.3.1.ppc64le", "product_id": "cargo1.58-1.58.0-150300.7.3.1.ppc64le" } }, { "category": "product_version", "name": "cargo1.59-1.59.0-150300.7.4.2.ppc64le", "product": { "name": "cargo1.59-1.59.0-150300.7.4.2.ppc64le", "product_id": "cargo1.59-1.59.0-150300.7.4.2.ppc64le" } }, { "category": "product_version", "name": "rust-1.59.0-150300.21.20.1.ppc64le", "product": { "name": "rust-1.59.0-150300.21.20.1.ppc64le", "product_id": "rust-1.59.0-150300.21.20.1.ppc64le" } }, { "category": "product_version", "name": "rust1.58-1.58.0-150300.7.3.1.ppc64le", "product": { "name": "rust1.58-1.58.0-150300.7.3.1.ppc64le", "product_id": "rust1.58-1.58.0-150300.7.3.1.ppc64le" } }, { "category": "product_version", "name": "rust1.59-1.59.0-150300.7.4.2.ppc64le", "product": { "name": "rust1.59-1.59.0-150300.7.4.2.ppc64le", "product_id": "rust1.59-1.59.0-150300.7.4.2.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "cargo-1.59.0-150300.21.20.1.s390x", "product": { "name": "cargo-1.59.0-150300.21.20.1.s390x", "product_id": "cargo-1.59.0-150300.21.20.1.s390x" } }, { "category": "product_version", "name": "cargo1.58-1.58.0-150300.7.3.1.s390x", "product": { "name": "cargo1.58-1.58.0-150300.7.3.1.s390x", "product_id": "cargo1.58-1.58.0-150300.7.3.1.s390x" } }, { "category": "product_version", "name": "cargo1.59-1.59.0-150300.7.4.2.s390x", "product": { "name": "cargo1.59-1.59.0-150300.7.4.2.s390x", "product_id": "cargo1.59-1.59.0-150300.7.4.2.s390x" } }, { "category": "product_version", "name": "rust-1.59.0-150300.21.20.1.s390x", "product": { "name": "rust-1.59.0-150300.21.20.1.s390x", "product_id": "rust-1.59.0-150300.21.20.1.s390x" } }, { "category": "product_version", "name": "rust1.58-1.58.0-150300.7.3.1.s390x", "product": { "name": "rust1.58-1.58.0-150300.7.3.1.s390x", "product_id": "rust1.58-1.58.0-150300.7.3.1.s390x" } }, { "category": "product_version", "name": "rust1.59-1.59.0-150300.7.4.2.s390x", "product": { "name": "rust1.59-1.59.0-150300.7.4.2.s390x", "product_id": "rust1.59-1.59.0-150300.7.4.2.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "cargo-1.59.0-150300.21.20.1.x86_64", "product": { "name": "cargo-1.59.0-150300.21.20.1.x86_64", "product_id": "cargo-1.59.0-150300.21.20.1.x86_64" } }, { "category": "product_version", "name": "cargo1.58-1.58.0-150300.7.3.1.x86_64", "product": { "name": "cargo1.58-1.58.0-150300.7.3.1.x86_64", "product_id": "cargo1.58-1.58.0-150300.7.3.1.x86_64" } }, { "category": "product_version", "name": "cargo1.59-1.59.0-150300.7.4.2.x86_64", "product": { "name": "cargo1.59-1.59.0-150300.7.4.2.x86_64", "product_id": "cargo1.59-1.59.0-150300.7.4.2.x86_64" } }, { "category": "product_version", "name": "rust-1.59.0-150300.21.20.1.x86_64", "product": { "name": "rust-1.59.0-150300.21.20.1.x86_64", "product_id": "rust-1.59.0-150300.21.20.1.x86_64" } }, { "category": "product_version", "name": "rust1.58-1.58.0-150300.7.3.1.x86_64", "product": { "name": "rust1.58-1.58.0-150300.7.3.1.x86_64", "product_id": "rust1.58-1.58.0-150300.7.3.1.x86_64" } }, { "category": "product_version", "name": "rust1.59-1.59.0-150300.7.4.2.x86_64", "product": { "name": "rust1.59-1.59.0-150300.7.4.2.x86_64", "product_id": "rust1.59-1.59.0-150300.7.4.2.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Module for Development Tools 15 SP3", "product": { "name": "SUSE Linux Enterprise Module for Development Tools 15 SP3", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-development-tools:15:sp3" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "cargo-1.59.0-150300.21.20.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP3", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP3:cargo-1.59.0-150300.21.20.1.aarch64" }, "product_reference": "cargo-1.59.0-150300.21.20.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "cargo-1.59.0-150300.21.20.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP3", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP3:cargo-1.59.0-150300.21.20.1.ppc64le" }, "product_reference": "cargo-1.59.0-150300.21.20.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "cargo-1.59.0-150300.21.20.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP3", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP3:cargo-1.59.0-150300.21.20.1.s390x" }, "product_reference": "cargo-1.59.0-150300.21.20.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "cargo-1.59.0-150300.21.20.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP3", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP3:cargo-1.59.0-150300.21.20.1.x86_64" }, "product_reference": "cargo-1.59.0-150300.21.20.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "cargo1.58-1.58.0-150300.7.3.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP3", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP3:cargo1.58-1.58.0-150300.7.3.1.aarch64" }, "product_reference": "cargo1.58-1.58.0-150300.7.3.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "cargo1.58-1.58.0-150300.7.3.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP3", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP3:cargo1.58-1.58.0-150300.7.3.1.ppc64le" }, "product_reference": "cargo1.58-1.58.0-150300.7.3.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "cargo1.58-1.58.0-150300.7.3.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP3", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP3:cargo1.58-1.58.0-150300.7.3.1.s390x" }, "product_reference": "cargo1.58-1.58.0-150300.7.3.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "cargo1.58-1.58.0-150300.7.3.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP3", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP3:cargo1.58-1.58.0-150300.7.3.1.x86_64" }, "product_reference": "cargo1.58-1.58.0-150300.7.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "cargo1.59-1.59.0-150300.7.4.2.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP3", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP3:cargo1.59-1.59.0-150300.7.4.2.aarch64" }, "product_reference": "cargo1.59-1.59.0-150300.7.4.2.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "cargo1.59-1.59.0-150300.7.4.2.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP3", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP3:cargo1.59-1.59.0-150300.7.4.2.ppc64le" }, "product_reference": "cargo1.59-1.59.0-150300.7.4.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "cargo1.59-1.59.0-150300.7.4.2.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP3", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP3:cargo1.59-1.59.0-150300.7.4.2.s390x" }, "product_reference": "cargo1.59-1.59.0-150300.7.4.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "cargo1.59-1.59.0-150300.7.4.2.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP3", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP3:cargo1.59-1.59.0-150300.7.4.2.x86_64" }, "product_reference": "cargo1.59-1.59.0-150300.7.4.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "rust-1.59.0-150300.21.20.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP3", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP3:rust-1.59.0-150300.21.20.1.aarch64" }, "product_reference": "rust-1.59.0-150300.21.20.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "rust-1.59.0-150300.21.20.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP3", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP3:rust-1.59.0-150300.21.20.1.ppc64le" }, "product_reference": "rust-1.59.0-150300.21.20.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "rust-1.59.0-150300.21.20.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP3", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP3:rust-1.59.0-150300.21.20.1.s390x" }, "product_reference": "rust-1.59.0-150300.21.20.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "rust-1.59.0-150300.21.20.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP3", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP3:rust-1.59.0-150300.21.20.1.x86_64" }, "product_reference": "rust-1.59.0-150300.21.20.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "rust1.58-1.58.0-150300.7.3.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP3", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP3:rust1.58-1.58.0-150300.7.3.1.aarch64" }, "product_reference": "rust1.58-1.58.0-150300.7.3.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "rust1.58-1.58.0-150300.7.3.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP3", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP3:rust1.58-1.58.0-150300.7.3.1.ppc64le" }, "product_reference": "rust1.58-1.58.0-150300.7.3.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "rust1.58-1.58.0-150300.7.3.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP3", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP3:rust1.58-1.58.0-150300.7.3.1.s390x" }, "product_reference": "rust1.58-1.58.0-150300.7.3.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "rust1.58-1.58.0-150300.7.3.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP3", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP3:rust1.58-1.58.0-150300.7.3.1.x86_64" }, "product_reference": "rust1.58-1.58.0-150300.7.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "rust1.59-1.59.0-150300.7.4.2.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP3", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP3:rust1.59-1.59.0-150300.7.4.2.aarch64" }, "product_reference": "rust1.59-1.59.0-150300.7.4.2.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "rust1.59-1.59.0-150300.7.4.2.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP3", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP3:rust1.59-1.59.0-150300.7.4.2.ppc64le" }, "product_reference": "rust1.59-1.59.0-150300.7.4.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "rust1.59-1.59.0-150300.7.4.2.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP3", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP3:rust1.59-1.59.0-150300.7.4.2.s390x" }, "product_reference": "rust1.59-1.59.0-150300.7.4.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "rust1.59-1.59.0-150300.7.4.2.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP3", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP3:rust1.59-1.59.0-150300.7.4.2.x86_64" }, "product_reference": "rust1.59-1.59.0-150300.7.4.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP3" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-21658", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-21658" } ], "notes": [ { "category": "general", "text": "Rust is a multi-paradigm, general-purpose programming language designed for performance and safety, especially safe concurrency. The Rust Security Response WG was notified that the `std::fs::remove_dir_all` standard library function is vulnerable a race condition enabling symlink following (CWE-363). An attacker could use this security issue to trick a privileged program into deleting files and directories the attacker couldn\u0027t otherwise access or delete. Rust 1.0.0 through Rust 1.58.0 is affected by this vulnerability with 1.58.1 containing a patch. Note that the following build targets don\u0027t have usable APIs to properly mitigate the attack, and are thus still vulnerable even with a patched toolchain: macOS before version 10.10 (Yosemite) and REDOX. We recommend everyone to update to Rust 1.58.1 as soon as possible, especially people developing programs expected to run in privileged contexts (including system daemons and setuid binaries), as those have the highest risk of being affected by this. Note that adding checks in your codebase before calling remove_dir_all will not mitigate the vulnerability, as they would also be vulnerable to race conditions like remove_dir_all itself. The existing mitigation is working as intended outside of race conditions.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Development Tools 15 SP3:cargo-1.59.0-150300.21.20.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:cargo-1.59.0-150300.21.20.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:cargo-1.59.0-150300.21.20.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:cargo-1.59.0-150300.21.20.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:cargo1.58-1.58.0-150300.7.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:cargo1.58-1.58.0-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:cargo1.58-1.58.0-150300.7.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:cargo1.58-1.58.0-150300.7.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:cargo1.59-1.59.0-150300.7.4.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:cargo1.59-1.59.0-150300.7.4.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:cargo1.59-1.59.0-150300.7.4.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:cargo1.59-1.59.0-150300.7.4.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:rust-1.59.0-150300.21.20.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:rust-1.59.0-150300.21.20.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:rust-1.59.0-150300.21.20.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:rust-1.59.0-150300.21.20.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:rust1.58-1.58.0-150300.7.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:rust1.58-1.58.0-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:rust1.58-1.58.0-150300.7.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:rust1.58-1.58.0-150300.7.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:rust1.59-1.59.0-150300.7.4.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:rust1.59-1.59.0-150300.7.4.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:rust1.59-1.59.0-150300.7.4.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:rust1.59-1.59.0-150300.7.4.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-21658", "url": "https://www.suse.com/security/cve/CVE-2022-21658" }, { "category": "external", "summary": "SUSE Bug 1194767 for CVE-2022-21658", "url": "https://bugzilla.suse.com/1194767" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Development Tools 15 SP3:cargo-1.59.0-150300.21.20.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:cargo-1.59.0-150300.21.20.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:cargo-1.59.0-150300.21.20.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:cargo-1.59.0-150300.21.20.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:cargo1.58-1.58.0-150300.7.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:cargo1.58-1.58.0-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:cargo1.58-1.58.0-150300.7.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:cargo1.58-1.58.0-150300.7.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:cargo1.59-1.59.0-150300.7.4.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:cargo1.59-1.59.0-150300.7.4.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:cargo1.59-1.59.0-150300.7.4.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:cargo1.59-1.59.0-150300.7.4.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:rust-1.59.0-150300.21.20.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:rust-1.59.0-150300.21.20.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:rust-1.59.0-150300.21.20.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:rust-1.59.0-150300.21.20.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:rust1.58-1.58.0-150300.7.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:rust1.58-1.58.0-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:rust1.58-1.58.0-150300.7.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:rust1.58-1.58.0-150300.7.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:rust1.59-1.59.0-150300.7.4.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:rust1.59-1.59.0-150300.7.4.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:rust1.59-1.59.0-150300.7.4.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:rust1.59-1.59.0-150300.7.4.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Development Tools 15 SP3:cargo-1.59.0-150300.21.20.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:cargo-1.59.0-150300.21.20.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:cargo-1.59.0-150300.21.20.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:cargo-1.59.0-150300.21.20.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:cargo1.58-1.58.0-150300.7.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:cargo1.58-1.58.0-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:cargo1.58-1.58.0-150300.7.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:cargo1.58-1.58.0-150300.7.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:cargo1.59-1.59.0-150300.7.4.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:cargo1.59-1.59.0-150300.7.4.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:cargo1.59-1.59.0-150300.7.4.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:cargo1.59-1.59.0-150300.7.4.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:rust-1.59.0-150300.21.20.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:rust-1.59.0-150300.21.20.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:rust-1.59.0-150300.21.20.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:rust-1.59.0-150300.21.20.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:rust1.58-1.58.0-150300.7.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:rust1.58-1.58.0-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:rust1.58-1.58.0-150300.7.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:rust1.58-1.58.0-150300.7.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:rust1.59-1.59.0-150300.7.4.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:rust1.59-1.59.0-150300.7.4.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:rust1.59-1.59.0-150300.7.4.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:rust1.59-1.59.0-150300.7.4.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-03-15T10:33:49Z", "details": "moderate" } ], "title": "CVE-2022-21658" } ] }
suse-su-2022:0175-1
Vulnerability from csaf_suse
Published
2022-01-25 13:10
Modified
2022-01-25 13:10
Summary
Security update for rust1.57
Notes
Title of the patch
Security update for rust1.57
Description of the patch
This update for rust1.57 fixes the following issues:
- CVE-2022-21658: Fixed race condition in std::fs::remove_dir_all (bsc#1194767).
Patchnames
SUSE-2022-175,SUSE-SLE-Module-Development-Tools-15-SP3-2022-175
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for rust1.57", "title": "Title of the patch" }, { "category": "description", "text": "This update for rust1.57 fixes the following issues:\n\n- CVE-2022-21658: Fixed race condition in std::fs::remove_dir_all (bsc#1194767).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2022-175,SUSE-SLE-Module-Development-Tools-15-SP3-2022-175", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_0175-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2022:0175-1", "url": "https://www.suse.com/support/update/announcement/2022/suse-su-20220175-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2022:0175-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-January/010067.html" }, { "category": "self", "summary": "SUSE Bug 1194767", "url": "https://bugzilla.suse.com/1194767" }, { "category": "self", "summary": "SUSE CVE CVE-2022-21658 page", "url": "https://www.suse.com/security/cve/CVE-2022-21658/" } ], "title": "Security update for rust1.57", "tracking": { "current_release_date": "2022-01-25T13:10:42Z", "generator": { "date": "2022-01-25T13:10:42Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2022:0175-1", "initial_release_date": "2022-01-25T13:10:42Z", "revision_history": [ { "date": "2022-01-25T13:10:42Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "cargo1.57-1.57.0-150300.7.7.1.aarch64", "product": { "name": "cargo1.57-1.57.0-150300.7.7.1.aarch64", "product_id": "cargo1.57-1.57.0-150300.7.7.1.aarch64" } }, { "category": "product_version", "name": "rust1.57-1.57.0-150300.7.7.1.aarch64", "product": { "name": "rust1.57-1.57.0-150300.7.7.1.aarch64", "product_id": "rust1.57-1.57.0-150300.7.7.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "cargo1.57-1.57.0-150300.7.7.1.i586", "product": { "name": "cargo1.57-1.57.0-150300.7.7.1.i586", "product_id": "cargo1.57-1.57.0-150300.7.7.1.i586" } }, { "category": "product_version", "name": "rust1.57-1.57.0-150300.7.7.1.i586", "product": { "name": "rust1.57-1.57.0-150300.7.7.1.i586", "product_id": "rust1.57-1.57.0-150300.7.7.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "cargo1.57-1.57.0-150300.7.7.1.ppc64le", "product": { "name": "cargo1.57-1.57.0-150300.7.7.1.ppc64le", "product_id": "cargo1.57-1.57.0-150300.7.7.1.ppc64le" } }, { "category": "product_version", "name": "rust1.57-1.57.0-150300.7.7.1.ppc64le", "product": { "name": "rust1.57-1.57.0-150300.7.7.1.ppc64le", "product_id": "rust1.57-1.57.0-150300.7.7.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "cargo1.57-1.57.0-150300.7.7.1.s390x", "product": { "name": "cargo1.57-1.57.0-150300.7.7.1.s390x", "product_id": "cargo1.57-1.57.0-150300.7.7.1.s390x" } }, { "category": "product_version", "name": "rust1.57-1.57.0-150300.7.7.1.s390x", "product": { "name": "rust1.57-1.57.0-150300.7.7.1.s390x", "product_id": "rust1.57-1.57.0-150300.7.7.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "cargo1.57-1.57.0-150300.7.7.1.x86_64", "product": { "name": "cargo1.57-1.57.0-150300.7.7.1.x86_64", "product_id": "cargo1.57-1.57.0-150300.7.7.1.x86_64" } }, { "category": "product_version", "name": "rust1.57-1.57.0-150300.7.7.1.x86_64", "product": { "name": "rust1.57-1.57.0-150300.7.7.1.x86_64", "product_id": "rust1.57-1.57.0-150300.7.7.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Module for Development Tools 15 SP3", "product": { "name": "SUSE Linux Enterprise Module for Development Tools 15 SP3", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-development-tools:15:sp3" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "cargo1.57-1.57.0-150300.7.7.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP3", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP3:cargo1.57-1.57.0-150300.7.7.1.aarch64" }, "product_reference": "cargo1.57-1.57.0-150300.7.7.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "cargo1.57-1.57.0-150300.7.7.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP3", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP3:cargo1.57-1.57.0-150300.7.7.1.ppc64le" }, "product_reference": "cargo1.57-1.57.0-150300.7.7.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "cargo1.57-1.57.0-150300.7.7.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP3", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP3:cargo1.57-1.57.0-150300.7.7.1.s390x" }, "product_reference": "cargo1.57-1.57.0-150300.7.7.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "cargo1.57-1.57.0-150300.7.7.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP3", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP3:cargo1.57-1.57.0-150300.7.7.1.x86_64" }, "product_reference": "cargo1.57-1.57.0-150300.7.7.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "rust1.57-1.57.0-150300.7.7.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP3", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP3:rust1.57-1.57.0-150300.7.7.1.aarch64" }, "product_reference": "rust1.57-1.57.0-150300.7.7.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "rust1.57-1.57.0-150300.7.7.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP3", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP3:rust1.57-1.57.0-150300.7.7.1.ppc64le" }, "product_reference": "rust1.57-1.57.0-150300.7.7.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "rust1.57-1.57.0-150300.7.7.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP3", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP3:rust1.57-1.57.0-150300.7.7.1.s390x" }, "product_reference": "rust1.57-1.57.0-150300.7.7.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "rust1.57-1.57.0-150300.7.7.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP3", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP3:rust1.57-1.57.0-150300.7.7.1.x86_64" }, "product_reference": "rust1.57-1.57.0-150300.7.7.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP3" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-21658", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-21658" } ], "notes": [ { "category": "general", "text": "Rust is a multi-paradigm, general-purpose programming language designed for performance and safety, especially safe concurrency. The Rust Security Response WG was notified that the `std::fs::remove_dir_all` standard library function is vulnerable a race condition enabling symlink following (CWE-363). An attacker could use this security issue to trick a privileged program into deleting files and directories the attacker couldn\u0027t otherwise access or delete. Rust 1.0.0 through Rust 1.58.0 is affected by this vulnerability with 1.58.1 containing a patch. Note that the following build targets don\u0027t have usable APIs to properly mitigate the attack, and are thus still vulnerable even with a patched toolchain: macOS before version 10.10 (Yosemite) and REDOX. We recommend everyone to update to Rust 1.58.1 as soon as possible, especially people developing programs expected to run in privileged contexts (including system daemons and setuid binaries), as those have the highest risk of being affected by this. Note that adding checks in your codebase before calling remove_dir_all will not mitigate the vulnerability, as they would also be vulnerable to race conditions like remove_dir_all itself. The existing mitigation is working as intended outside of race conditions.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Development Tools 15 SP3:cargo1.57-1.57.0-150300.7.7.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:cargo1.57-1.57.0-150300.7.7.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:cargo1.57-1.57.0-150300.7.7.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:cargo1.57-1.57.0-150300.7.7.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:rust1.57-1.57.0-150300.7.7.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:rust1.57-1.57.0-150300.7.7.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:rust1.57-1.57.0-150300.7.7.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:rust1.57-1.57.0-150300.7.7.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-21658", "url": "https://www.suse.com/security/cve/CVE-2022-21658" }, { "category": "external", "summary": "SUSE Bug 1194767 for CVE-2022-21658", "url": "https://bugzilla.suse.com/1194767" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Development Tools 15 SP3:cargo1.57-1.57.0-150300.7.7.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:cargo1.57-1.57.0-150300.7.7.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:cargo1.57-1.57.0-150300.7.7.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:cargo1.57-1.57.0-150300.7.7.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:rust1.57-1.57.0-150300.7.7.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:rust1.57-1.57.0-150300.7.7.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:rust1.57-1.57.0-150300.7.7.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:rust1.57-1.57.0-150300.7.7.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Development Tools 15 SP3:cargo1.57-1.57.0-150300.7.7.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:cargo1.57-1.57.0-150300.7.7.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:cargo1.57-1.57.0-150300.7.7.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:cargo1.57-1.57.0-150300.7.7.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:rust1.57-1.57.0-150300.7.7.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:rust1.57-1.57.0-150300.7.7.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:rust1.57-1.57.0-150300.7.7.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:rust1.57-1.57.0-150300.7.7.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-01-25T13:10:42Z", "details": "moderate" } ], "title": "CVE-2022-21658" } ] }
suse-su-2022:0149-1
Vulnerability from csaf_suse
Published
2022-01-21 08:04
Modified
2022-01-21 08:04
Summary
Security update for rust1.56
Notes
Title of the patch
Security update for rust1.56
Description of the patch
This update for rust1.56 fixes the following issues:
- CVE-2022-21658: Fixed race condition in std::fs::remove_dir_all (bsc#1194767).
Patchnames
SUSE-2022-149,SUSE-SLE-Module-Development-Tools-15-SP3-2022-149
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for rust1.56", "title": "Title of the patch" }, { "category": "description", "text": "This update for rust1.56 fixes the following issues:\n\n- CVE-2022-21658: Fixed race condition in std::fs::remove_dir_all (bsc#1194767).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2022-149,SUSE-SLE-Module-Development-Tools-15-SP3-2022-149", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_0149-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2022:0149-1", "url": "https://www.suse.com/support/update/announcement/2022/suse-su-20220149-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2022:0149-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-January/010045.html" }, { "category": "self", "summary": "SUSE Bug 1194767", "url": "https://bugzilla.suse.com/1194767" }, { "category": "self", "summary": "SUSE CVE CVE-2022-21658 page", "url": "https://www.suse.com/security/cve/CVE-2022-21658/" } ], "title": "Security update for rust1.56", "tracking": { "current_release_date": "2022-01-21T08:04:54Z", "generator": { "date": "2022-01-21T08:04:54Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2022:0149-1", "initial_release_date": "2022-01-21T08:04:54Z", "revision_history": [ { "date": "2022-01-21T08:04:54Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "cargo1.56-1.56.1-150300.7.6.1.aarch64", "product": { "name": "cargo1.56-1.56.1-150300.7.6.1.aarch64", "product_id": "cargo1.56-1.56.1-150300.7.6.1.aarch64" } }, { "category": "product_version", "name": "rust1.56-1.56.1-150300.7.6.1.aarch64", "product": { "name": "rust1.56-1.56.1-150300.7.6.1.aarch64", "product_id": "rust1.56-1.56.1-150300.7.6.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "cargo1.56-1.56.1-150300.7.6.1.i586", "product": { "name": "cargo1.56-1.56.1-150300.7.6.1.i586", "product_id": "cargo1.56-1.56.1-150300.7.6.1.i586" } }, { "category": "product_version", "name": "rust1.56-1.56.1-150300.7.6.1.i586", "product": { "name": "rust1.56-1.56.1-150300.7.6.1.i586", "product_id": "rust1.56-1.56.1-150300.7.6.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "cargo1.56-1.56.1-150300.7.6.1.ppc64le", "product": { "name": "cargo1.56-1.56.1-150300.7.6.1.ppc64le", "product_id": "cargo1.56-1.56.1-150300.7.6.1.ppc64le" } }, { "category": "product_version", "name": "rust1.56-1.56.1-150300.7.6.1.ppc64le", "product": { "name": "rust1.56-1.56.1-150300.7.6.1.ppc64le", "product_id": "rust1.56-1.56.1-150300.7.6.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "cargo1.56-1.56.1-150300.7.6.1.s390x", "product": { "name": "cargo1.56-1.56.1-150300.7.6.1.s390x", "product_id": "cargo1.56-1.56.1-150300.7.6.1.s390x" } }, { "category": "product_version", "name": "rust1.56-1.56.1-150300.7.6.1.s390x", "product": { "name": "rust1.56-1.56.1-150300.7.6.1.s390x", "product_id": "rust1.56-1.56.1-150300.7.6.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "cargo1.56-1.56.1-150300.7.6.1.x86_64", "product": { "name": "cargo1.56-1.56.1-150300.7.6.1.x86_64", "product_id": "cargo1.56-1.56.1-150300.7.6.1.x86_64" } }, { "category": "product_version", "name": "rust1.56-1.56.1-150300.7.6.1.x86_64", "product": { "name": "rust1.56-1.56.1-150300.7.6.1.x86_64", "product_id": "rust1.56-1.56.1-150300.7.6.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Module for Development Tools 15 SP3", "product": { "name": "SUSE Linux Enterprise Module for Development Tools 15 SP3", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-development-tools:15:sp3" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "cargo1.56-1.56.1-150300.7.6.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP3", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP3:cargo1.56-1.56.1-150300.7.6.1.aarch64" }, "product_reference": "cargo1.56-1.56.1-150300.7.6.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "cargo1.56-1.56.1-150300.7.6.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP3", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP3:cargo1.56-1.56.1-150300.7.6.1.ppc64le" }, "product_reference": "cargo1.56-1.56.1-150300.7.6.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "cargo1.56-1.56.1-150300.7.6.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP3", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP3:cargo1.56-1.56.1-150300.7.6.1.s390x" }, "product_reference": "cargo1.56-1.56.1-150300.7.6.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "cargo1.56-1.56.1-150300.7.6.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP3", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP3:cargo1.56-1.56.1-150300.7.6.1.x86_64" }, "product_reference": "cargo1.56-1.56.1-150300.7.6.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "rust1.56-1.56.1-150300.7.6.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP3", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP3:rust1.56-1.56.1-150300.7.6.1.aarch64" }, "product_reference": "rust1.56-1.56.1-150300.7.6.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "rust1.56-1.56.1-150300.7.6.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP3", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP3:rust1.56-1.56.1-150300.7.6.1.ppc64le" }, "product_reference": "rust1.56-1.56.1-150300.7.6.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "rust1.56-1.56.1-150300.7.6.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP3", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP3:rust1.56-1.56.1-150300.7.6.1.s390x" }, "product_reference": "rust1.56-1.56.1-150300.7.6.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "rust1.56-1.56.1-150300.7.6.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP3", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP3:rust1.56-1.56.1-150300.7.6.1.x86_64" }, "product_reference": "rust1.56-1.56.1-150300.7.6.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP3" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-21658", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-21658" } ], "notes": [ { "category": "general", "text": "Rust is a multi-paradigm, general-purpose programming language designed for performance and safety, especially safe concurrency. The Rust Security Response WG was notified that the `std::fs::remove_dir_all` standard library function is vulnerable a race condition enabling symlink following (CWE-363). An attacker could use this security issue to trick a privileged program into deleting files and directories the attacker couldn\u0027t otherwise access or delete. Rust 1.0.0 through Rust 1.58.0 is affected by this vulnerability with 1.58.1 containing a patch. Note that the following build targets don\u0027t have usable APIs to properly mitigate the attack, and are thus still vulnerable even with a patched toolchain: macOS before version 10.10 (Yosemite) and REDOX. We recommend everyone to update to Rust 1.58.1 as soon as possible, especially people developing programs expected to run in privileged contexts (including system daemons and setuid binaries), as those have the highest risk of being affected by this. Note that adding checks in your codebase before calling remove_dir_all will not mitigate the vulnerability, as they would also be vulnerable to race conditions like remove_dir_all itself. The existing mitigation is working as intended outside of race conditions.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Development Tools 15 SP3:cargo1.56-1.56.1-150300.7.6.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:cargo1.56-1.56.1-150300.7.6.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:cargo1.56-1.56.1-150300.7.6.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:cargo1.56-1.56.1-150300.7.6.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:rust1.56-1.56.1-150300.7.6.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:rust1.56-1.56.1-150300.7.6.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:rust1.56-1.56.1-150300.7.6.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:rust1.56-1.56.1-150300.7.6.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-21658", "url": "https://www.suse.com/security/cve/CVE-2022-21658" }, { "category": "external", "summary": "SUSE Bug 1194767 for CVE-2022-21658", "url": "https://bugzilla.suse.com/1194767" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Development Tools 15 SP3:cargo1.56-1.56.1-150300.7.6.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:cargo1.56-1.56.1-150300.7.6.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:cargo1.56-1.56.1-150300.7.6.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:cargo1.56-1.56.1-150300.7.6.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:rust1.56-1.56.1-150300.7.6.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:rust1.56-1.56.1-150300.7.6.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:rust1.56-1.56.1-150300.7.6.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:rust1.56-1.56.1-150300.7.6.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Development Tools 15 SP3:cargo1.56-1.56.1-150300.7.6.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:cargo1.56-1.56.1-150300.7.6.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:cargo1.56-1.56.1-150300.7.6.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:cargo1.56-1.56.1-150300.7.6.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:rust1.56-1.56.1-150300.7.6.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:rust1.56-1.56.1-150300.7.6.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:rust1.56-1.56.1-150300.7.6.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:rust1.56-1.56.1-150300.7.6.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-01-21T08:04:54Z", "details": "moderate" } ], "title": "CVE-2022-21658" } ] }
suse-su-2022:0171-1
Vulnerability from csaf_suse
Published
2022-01-25 12:56
Modified
2022-01-25 12:56
Summary
Security update for rust1.55
Notes
Title of the patch
Security update for rust1.55
Description of the patch
This update for rust1.55 fixes the following issues:
- CVE-2022-21658: Fixed race condition in std::fs::remove_dir_all (bsc#1194767).
Patchnames
SUSE-2022-171,SUSE-SLE-Module-Development-Tools-15-SP3-2022-171
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for rust1.55", "title": "Title of the patch" }, { "category": "description", "text": "This update for rust1.55 fixes the following issues:\n\n- CVE-2022-21658: Fixed race condition in std::fs::remove_dir_all (bsc#1194767).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2022-171,SUSE-SLE-Module-Development-Tools-15-SP3-2022-171", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_0171-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2022:0171-1", "url": "https://www.suse.com/support/update/announcement/2022/suse-su-20220171-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2022:0171-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-January/010068.html" }, { "category": "self", "summary": "SUSE Bug 1194767", "url": "https://bugzilla.suse.com/1194767" }, { "category": "self", "summary": "SUSE CVE CVE-2022-21658 page", "url": "https://www.suse.com/security/cve/CVE-2022-21658/" } ], "title": "Security update for rust1.55", "tracking": { "current_release_date": "2022-01-25T12:56:23Z", "generator": { "date": "2022-01-25T12:56:23Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2022:0171-1", "initial_release_date": "2022-01-25T12:56:23Z", "revision_history": [ { "date": "2022-01-25T12:56:23Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "cargo1.55-1.55.0-150300.7.6.1.aarch64", "product": { "name": "cargo1.55-1.55.0-150300.7.6.1.aarch64", "product_id": "cargo1.55-1.55.0-150300.7.6.1.aarch64" } }, { "category": "product_version", "name": "rust1.55-1.55.0-150300.7.6.1.aarch64", "product": { "name": "rust1.55-1.55.0-150300.7.6.1.aarch64", "product_id": "rust1.55-1.55.0-150300.7.6.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "cargo1.55-1.55.0-150300.7.6.1.i586", "product": { "name": "cargo1.55-1.55.0-150300.7.6.1.i586", "product_id": "cargo1.55-1.55.0-150300.7.6.1.i586" } }, { "category": "product_version", "name": "rust1.55-1.55.0-150300.7.6.1.i586", "product": { "name": "rust1.55-1.55.0-150300.7.6.1.i586", "product_id": "rust1.55-1.55.0-150300.7.6.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "cargo1.55-1.55.0-150300.7.6.1.ppc64le", "product": { "name": "cargo1.55-1.55.0-150300.7.6.1.ppc64le", "product_id": "cargo1.55-1.55.0-150300.7.6.1.ppc64le" } }, { "category": "product_version", "name": "rust1.55-1.55.0-150300.7.6.1.ppc64le", "product": { "name": "rust1.55-1.55.0-150300.7.6.1.ppc64le", "product_id": "rust1.55-1.55.0-150300.7.6.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "cargo1.55-1.55.0-150300.7.6.1.s390x", "product": { "name": "cargo1.55-1.55.0-150300.7.6.1.s390x", "product_id": "cargo1.55-1.55.0-150300.7.6.1.s390x" } }, { "category": "product_version", "name": "rust1.55-1.55.0-150300.7.6.1.s390x", "product": { "name": "rust1.55-1.55.0-150300.7.6.1.s390x", "product_id": "rust1.55-1.55.0-150300.7.6.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "cargo1.55-1.55.0-150300.7.6.1.x86_64", "product": { "name": "cargo1.55-1.55.0-150300.7.6.1.x86_64", "product_id": "cargo1.55-1.55.0-150300.7.6.1.x86_64" } }, { "category": "product_version", "name": "rust1.55-1.55.0-150300.7.6.1.x86_64", "product": { "name": "rust1.55-1.55.0-150300.7.6.1.x86_64", "product_id": "rust1.55-1.55.0-150300.7.6.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Module for Development Tools 15 SP3", "product": { "name": "SUSE Linux Enterprise Module for Development Tools 15 SP3", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-development-tools:15:sp3" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "cargo1.55-1.55.0-150300.7.6.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP3", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP3:cargo1.55-1.55.0-150300.7.6.1.aarch64" }, "product_reference": "cargo1.55-1.55.0-150300.7.6.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "cargo1.55-1.55.0-150300.7.6.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP3", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP3:cargo1.55-1.55.0-150300.7.6.1.ppc64le" }, "product_reference": "cargo1.55-1.55.0-150300.7.6.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "cargo1.55-1.55.0-150300.7.6.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP3", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP3:cargo1.55-1.55.0-150300.7.6.1.s390x" }, "product_reference": "cargo1.55-1.55.0-150300.7.6.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "cargo1.55-1.55.0-150300.7.6.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP3", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP3:cargo1.55-1.55.0-150300.7.6.1.x86_64" }, "product_reference": "cargo1.55-1.55.0-150300.7.6.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "rust1.55-1.55.0-150300.7.6.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP3", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP3:rust1.55-1.55.0-150300.7.6.1.aarch64" }, "product_reference": "rust1.55-1.55.0-150300.7.6.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "rust1.55-1.55.0-150300.7.6.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP3", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP3:rust1.55-1.55.0-150300.7.6.1.ppc64le" }, "product_reference": "rust1.55-1.55.0-150300.7.6.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "rust1.55-1.55.0-150300.7.6.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP3", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP3:rust1.55-1.55.0-150300.7.6.1.s390x" }, "product_reference": "rust1.55-1.55.0-150300.7.6.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "rust1.55-1.55.0-150300.7.6.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP3", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP3:rust1.55-1.55.0-150300.7.6.1.x86_64" }, "product_reference": "rust1.55-1.55.0-150300.7.6.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP3" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-21658", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-21658" } ], "notes": [ { "category": "general", "text": "Rust is a multi-paradigm, general-purpose programming language designed for performance and safety, especially safe concurrency. The Rust Security Response WG was notified that the `std::fs::remove_dir_all` standard library function is vulnerable a race condition enabling symlink following (CWE-363). An attacker could use this security issue to trick a privileged program into deleting files and directories the attacker couldn\u0027t otherwise access or delete. Rust 1.0.0 through Rust 1.58.0 is affected by this vulnerability with 1.58.1 containing a patch. Note that the following build targets don\u0027t have usable APIs to properly mitigate the attack, and are thus still vulnerable even with a patched toolchain: macOS before version 10.10 (Yosemite) and REDOX. We recommend everyone to update to Rust 1.58.1 as soon as possible, especially people developing programs expected to run in privileged contexts (including system daemons and setuid binaries), as those have the highest risk of being affected by this. Note that adding checks in your codebase before calling remove_dir_all will not mitigate the vulnerability, as they would also be vulnerable to race conditions like remove_dir_all itself. The existing mitigation is working as intended outside of race conditions.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Development Tools 15 SP3:cargo1.55-1.55.0-150300.7.6.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:cargo1.55-1.55.0-150300.7.6.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:cargo1.55-1.55.0-150300.7.6.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:cargo1.55-1.55.0-150300.7.6.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:rust1.55-1.55.0-150300.7.6.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:rust1.55-1.55.0-150300.7.6.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:rust1.55-1.55.0-150300.7.6.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:rust1.55-1.55.0-150300.7.6.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-21658", "url": "https://www.suse.com/security/cve/CVE-2022-21658" }, { "category": "external", "summary": "SUSE Bug 1194767 for CVE-2022-21658", "url": "https://bugzilla.suse.com/1194767" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Development Tools 15 SP3:cargo1.55-1.55.0-150300.7.6.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:cargo1.55-1.55.0-150300.7.6.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:cargo1.55-1.55.0-150300.7.6.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:cargo1.55-1.55.0-150300.7.6.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:rust1.55-1.55.0-150300.7.6.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:rust1.55-1.55.0-150300.7.6.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:rust1.55-1.55.0-150300.7.6.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:rust1.55-1.55.0-150300.7.6.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Development Tools 15 SP3:cargo1.55-1.55.0-150300.7.6.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:cargo1.55-1.55.0-150300.7.6.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:cargo1.55-1.55.0-150300.7.6.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:cargo1.55-1.55.0-150300.7.6.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:rust1.55-1.55.0-150300.7.6.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:rust1.55-1.55.0-150300.7.6.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:rust1.55-1.55.0-150300.7.6.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:rust1.55-1.55.0-150300.7.6.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-01-25T12:56:23Z", "details": "moderate" } ], "title": "CVE-2022-21658" } ] }
suse-su-2022:0491-1
Vulnerability from csaf_suse
Published
2022-02-18 09:30
Modified
2022-02-18 09:30
Summary
Security update for rust
Notes
Title of the patch
Security update for rust
Description of the patch
This update for rust fixes the following issues:
- CVE-2022-21658: Fixed race condition in std::fs::remove_dir_all (bsc#1194767).
Patchnames
SUSE-2022-491,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2022-491,SUSE-SLE-Product-HPC-15-SP1-LTSS-2022-491,SUSE-SLE-Product-HPC-15-SP2-ESPOS-2022-491,SUSE-SLE-Product-HPC-15-SP2-LTSS-2022-491,SUSE-SLE-Product-RT-15-SP2-2022-491,SUSE-SLE-Product-SLES-15-SP1-BCL-2022-491,SUSE-SLE-Product-SLES-15-SP1-LTSS-2022-491,SUSE-SLE-Product-SLES-15-SP2-BCL-2022-491,SUSE-SLE-Product-SLES-15-SP2-LTSS-2022-491,SUSE-SLE-Product-SLES_SAP-15-SP1-2022-491,SUSE-SLE-Product-SLES_SAP-15-SP2-2022-491,SUSE-SLE-Product-SUSE-Manager-Proxy-4.1-2022-491,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.1-2022-491,SUSE-SLE-Product-SUSE-Manager-Server-4.1-2022-491,SUSE-Storage-6-2022-491,SUSE-Storage-7-2022-491
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for rust", "title": "Title of the patch" }, { "category": "description", "text": "This update for rust fixes the following issues:\n\n- CVE-2022-21658: Fixed race condition in std::fs::remove_dir_all (bsc#1194767).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2022-491,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2022-491,SUSE-SLE-Product-HPC-15-SP1-LTSS-2022-491,SUSE-SLE-Product-HPC-15-SP2-ESPOS-2022-491,SUSE-SLE-Product-HPC-15-SP2-LTSS-2022-491,SUSE-SLE-Product-RT-15-SP2-2022-491,SUSE-SLE-Product-SLES-15-SP1-BCL-2022-491,SUSE-SLE-Product-SLES-15-SP1-LTSS-2022-491,SUSE-SLE-Product-SLES-15-SP2-BCL-2022-491,SUSE-SLE-Product-SLES-15-SP2-LTSS-2022-491,SUSE-SLE-Product-SLES_SAP-15-SP1-2022-491,SUSE-SLE-Product-SLES_SAP-15-SP2-2022-491,SUSE-SLE-Product-SUSE-Manager-Proxy-4.1-2022-491,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.1-2022-491,SUSE-SLE-Product-SUSE-Manager-Server-4.1-2022-491,SUSE-Storage-6-2022-491,SUSE-Storage-7-2022-491", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_0491-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2022:0491-1", "url": "https://www.suse.com/support/update/announcement/2022/suse-su-20220491-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2022:0491-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-February/010252.html" }, { "category": "self", "summary": "SUSE Bug 1194767", "url": "https://bugzilla.suse.com/1194767" }, { "category": "self", "summary": "SUSE CVE CVE-2022-21658 page", "url": "https://www.suse.com/security/cve/CVE-2022-21658/" } ], "title": "Security update for rust", "tracking": { "current_release_date": "2022-02-18T09:30:32Z", "generator": { "date": "2022-02-18T09:30:32Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2022:0491-1", "initial_release_date": "2022-02-18T09:30:32Z", "revision_history": [ { "date": "2022-02-18T09:30:32Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "cargo-1.53.0-22.1.aarch64", "product": { "name": "cargo-1.53.0-22.1.aarch64", "product_id": "cargo-1.53.0-22.1.aarch64" } }, { "category": "product_version", "name": "rls-1.53.0-22.1.aarch64", "product": { "name": "rls-1.53.0-22.1.aarch64", "product_id": "rls-1.53.0-22.1.aarch64" } }, { "category": "product_version", "name": "rust-1.53.0-22.1.aarch64", "product": { "name": "rust-1.53.0-22.1.aarch64", "product_id": "rust-1.53.0-22.1.aarch64" } }, { "category": "product_version", "name": "rust-analysis-1.53.0-22.1.aarch64", "product": { "name": "rust-analysis-1.53.0-22.1.aarch64", "product_id": "rust-analysis-1.53.0-22.1.aarch64" } }, { "category": "product_version", "name": "rust-doc-1.53.0-22.1.aarch64", "product": { "name": "rust-doc-1.53.0-22.1.aarch64", "product_id": "rust-doc-1.53.0-22.1.aarch64" } }, { "category": "product_version", "name": "rust-gdb-1.53.0-22.1.aarch64", "product": { "name": "rust-gdb-1.53.0-22.1.aarch64", "product_id": "rust-gdb-1.53.0-22.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "cargo-1.53.0-22.1.i586", "product": { "name": "cargo-1.53.0-22.1.i586", "product_id": "cargo-1.53.0-22.1.i586" } }, { "category": "product_version", "name": "rust-1.53.0-22.1.i586", "product": { "name": "rust-1.53.0-22.1.i586", "product_id": "rust-1.53.0-22.1.i586" } }, { "category": "product_version", "name": "rust-gdb-1.53.0-22.1.i586", "product": { "name": "rust-gdb-1.53.0-22.1.i586", "product_id": "rust-gdb-1.53.0-22.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "cargo-doc-1.53.0-22.1.noarch", "product": { "name": "cargo-doc-1.53.0-22.1.noarch", "product_id": "cargo-doc-1.53.0-22.1.noarch" } }, { "category": "product_version", "name": "rust-src-1.53.0-22.1.noarch", "product": { "name": "rust-src-1.53.0-22.1.noarch", "product_id": "rust-src-1.53.0-22.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "cargo-1.53.0-22.1.ppc64le", "product": { "name": "cargo-1.53.0-22.1.ppc64le", "product_id": "cargo-1.53.0-22.1.ppc64le" } }, { "category": "product_version", "name": "rust-1.53.0-22.1.ppc64le", "product": { "name": "rust-1.53.0-22.1.ppc64le", "product_id": "rust-1.53.0-22.1.ppc64le" } }, { "category": "product_version", "name": "rust-gdb-1.53.0-22.1.ppc64le", "product": { "name": "rust-gdb-1.53.0-22.1.ppc64le", "product_id": "rust-gdb-1.53.0-22.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "cargo-1.53.0-22.1.s390x", "product": { "name": "cargo-1.53.0-22.1.s390x", "product_id": "cargo-1.53.0-22.1.s390x" } }, { "category": "product_version", "name": "rust-1.53.0-22.1.s390x", "product": { "name": "rust-1.53.0-22.1.s390x", "product_id": "rust-1.53.0-22.1.s390x" } }, { "category": "product_version", "name": "rust-gdb-1.53.0-22.1.s390x", "product": { "name": "rust-gdb-1.53.0-22.1.s390x", "product_id": "rust-gdb-1.53.0-22.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "cargo-1.53.0-22.1.x86_64", "product": { "name": "cargo-1.53.0-22.1.x86_64", "product_id": "cargo-1.53.0-22.1.x86_64" } }, { "category": "product_version", "name": "rls-1.53.0-22.1.x86_64", "product": { "name": "rls-1.53.0-22.1.x86_64", "product_id": "rls-1.53.0-22.1.x86_64" } }, { "category": "product_version", "name": "rust-1.53.0-22.1.x86_64", "product": { "name": "rust-1.53.0-22.1.x86_64", "product_id": "rust-1.53.0-22.1.x86_64" } }, { "category": "product_version", "name": "rust-analysis-1.53.0-22.1.x86_64", "product": { "name": "rust-analysis-1.53.0-22.1.x86_64", "product_id": "rust-analysis-1.53.0-22.1.x86_64" } }, { "category": "product_version", "name": "rust-doc-1.53.0-22.1.x86_64", "product": { "name": "rust-doc-1.53.0-22.1.x86_64", "product_id": "rust-doc-1.53.0-22.1.x86_64" } }, { "category": "product_version", "name": "rust-gdb-1.53.0-22.1.x86_64", "product": { "name": "rust-gdb-1.53.0-22.1.x86_64", "product_id": "rust-gdb-1.53.0-22.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", "product": { "name": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", "product_identification_helper": { "cpe": "cpe:/o:suse:sle_hpc-espos:15:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", "product": { "name": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", "product": { "name": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", "product_identification_helper": { "cpe": "cpe:/o:suse:sle_hpc-espos:15:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", "product": { "name": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Real Time 15 SP2", "product": { "name": "SUSE Linux Enterprise Real Time 15 SP2", "product_id": "SUSE Linux Enterprise Real Time 15 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sle_rt:15:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 15 SP1-BCL", "product": { "name": "SUSE Linux Enterprise Server 15 SP1-BCL", "product_id": "SUSE Linux Enterprise Server 15 SP1-BCL", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_bcl:15:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 15 SP1-LTSS", "product": { "name": "SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:15:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 15 SP2-BCL", "product": { "name": "SUSE Linux Enterprise Server 15 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 15 SP2-BCL", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_bcl:15:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 15 SP2-LTSS", "product": { "name": "SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:15:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP1", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:15:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:15:sp2" } } }, { "category": "product_name", "name": "SUSE Manager Proxy 4.1", "product": { "name": "SUSE Manager Proxy 4.1", "product_id": "SUSE Manager Proxy 4.1", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-manager-proxy:4.1" } } }, { "category": "product_name", "name": "SUSE Manager Retail Branch Server 4.1", "product": { "name": "SUSE Manager Retail Branch Server 4.1", "product_id": "SUSE Manager Retail Branch Server 4.1", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-manager-retail-branch-server:4.1" } } }, { "category": "product_name", "name": "SUSE Manager Server 4.1", "product": { "name": "SUSE Manager Server 4.1", "product_id": "SUSE Manager Server 4.1", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-manager-server:4.1" } } }, { "category": "product_name", "name": "SUSE Enterprise Storage 6", "product": { "name": "SUSE Enterprise Storage 6", "product_id": "SUSE Enterprise Storage 6", "product_identification_helper": { "cpe": "cpe:/o:suse:ses:6" } } }, { "category": "product_name", "name": "SUSE Enterprise Storage 7", "product": { "name": "SUSE Enterprise Storage 7", "product_id": "SUSE Enterprise Storage 7", "product_identification_helper": { "cpe": "cpe:/o:suse:ses:7" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "cargo-1.53.0-22.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:cargo-1.53.0-22.1.aarch64" }, "product_reference": "cargo-1.53.0-22.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "cargo-1.53.0-22.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:cargo-1.53.0-22.1.x86_64" }, "product_reference": "cargo-1.53.0-22.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "rls-1.53.0-22.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:rls-1.53.0-22.1.aarch64" }, "product_reference": "rls-1.53.0-22.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "rls-1.53.0-22.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:rls-1.53.0-22.1.x86_64" }, "product_reference": "rls-1.53.0-22.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "rust-1.53.0-22.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:rust-1.53.0-22.1.aarch64" }, "product_reference": "rust-1.53.0-22.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "rust-1.53.0-22.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:rust-1.53.0-22.1.x86_64" }, "product_reference": "rust-1.53.0-22.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "rust-analysis-1.53.0-22.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:rust-analysis-1.53.0-22.1.aarch64" }, "product_reference": "rust-analysis-1.53.0-22.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "rust-analysis-1.53.0-22.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:rust-analysis-1.53.0-22.1.x86_64" }, "product_reference": "rust-analysis-1.53.0-22.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "rust-src-1.53.0-22.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:rust-src-1.53.0-22.1.noarch" }, "product_reference": "rust-src-1.53.0-22.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "cargo-1.53.0-22.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:cargo-1.53.0-22.1.aarch64" }, "product_reference": "cargo-1.53.0-22.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "cargo-1.53.0-22.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:cargo-1.53.0-22.1.x86_64" }, "product_reference": "cargo-1.53.0-22.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "rls-1.53.0-22.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:rls-1.53.0-22.1.aarch64" }, "product_reference": "rls-1.53.0-22.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "rls-1.53.0-22.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:rls-1.53.0-22.1.x86_64" }, "product_reference": "rls-1.53.0-22.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "rust-1.53.0-22.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:rust-1.53.0-22.1.aarch64" }, "product_reference": "rust-1.53.0-22.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "rust-1.53.0-22.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:rust-1.53.0-22.1.x86_64" }, "product_reference": "rust-1.53.0-22.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "rust-analysis-1.53.0-22.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:rust-analysis-1.53.0-22.1.aarch64" }, "product_reference": "rust-analysis-1.53.0-22.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "rust-analysis-1.53.0-22.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:rust-analysis-1.53.0-22.1.x86_64" }, "product_reference": "rust-analysis-1.53.0-22.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "rust-src-1.53.0-22.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:rust-src-1.53.0-22.1.noarch" }, "product_reference": "rust-src-1.53.0-22.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "cargo-1.53.0-22.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:cargo-1.53.0-22.1.aarch64" }, "product_reference": "cargo-1.53.0-22.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "cargo-1.53.0-22.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:cargo-1.53.0-22.1.x86_64" }, "product_reference": "cargo-1.53.0-22.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "rls-1.53.0-22.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:rls-1.53.0-22.1.aarch64" }, "product_reference": "rls-1.53.0-22.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "rls-1.53.0-22.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:rls-1.53.0-22.1.x86_64" }, "product_reference": "rls-1.53.0-22.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "rust-1.53.0-22.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:rust-1.53.0-22.1.aarch64" }, "product_reference": "rust-1.53.0-22.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "rust-1.53.0-22.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:rust-1.53.0-22.1.x86_64" }, "product_reference": "rust-1.53.0-22.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "rust-analysis-1.53.0-22.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:rust-analysis-1.53.0-22.1.aarch64" }, "product_reference": "rust-analysis-1.53.0-22.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "rust-analysis-1.53.0-22.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:rust-analysis-1.53.0-22.1.x86_64" }, "product_reference": "rust-analysis-1.53.0-22.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "rust-src-1.53.0-22.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:rust-src-1.53.0-22.1.noarch" }, "product_reference": "rust-src-1.53.0-22.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "cargo-1.53.0-22.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:cargo-1.53.0-22.1.aarch64" }, "product_reference": "cargo-1.53.0-22.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "cargo-1.53.0-22.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:cargo-1.53.0-22.1.x86_64" }, "product_reference": "cargo-1.53.0-22.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "rls-1.53.0-22.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:rls-1.53.0-22.1.aarch64" }, "product_reference": "rls-1.53.0-22.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "rls-1.53.0-22.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:rls-1.53.0-22.1.x86_64" }, "product_reference": "rls-1.53.0-22.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "rust-1.53.0-22.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:rust-1.53.0-22.1.aarch64" }, "product_reference": "rust-1.53.0-22.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "rust-1.53.0-22.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:rust-1.53.0-22.1.x86_64" }, "product_reference": "rust-1.53.0-22.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "rust-analysis-1.53.0-22.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:rust-analysis-1.53.0-22.1.aarch64" }, "product_reference": "rust-analysis-1.53.0-22.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "rust-analysis-1.53.0-22.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:rust-analysis-1.53.0-22.1.x86_64" }, "product_reference": "rust-analysis-1.53.0-22.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "rust-src-1.53.0-22.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:rust-src-1.53.0-22.1.noarch" }, "product_reference": "rust-src-1.53.0-22.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "cargo-1.53.0-22.1.x86_64 as component of SUSE Linux Enterprise Real Time 15 SP2", "product_id": "SUSE Linux Enterprise Real Time 15 SP2:cargo-1.53.0-22.1.x86_64" }, "product_reference": "cargo-1.53.0-22.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "rls-1.53.0-22.1.x86_64 as component of SUSE Linux Enterprise Real Time 15 SP2", "product_id": "SUSE Linux Enterprise Real Time 15 SP2:rls-1.53.0-22.1.x86_64" }, "product_reference": "rls-1.53.0-22.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "rust-1.53.0-22.1.x86_64 as component of SUSE Linux Enterprise Real Time 15 SP2", "product_id": "SUSE Linux Enterprise Real Time 15 SP2:rust-1.53.0-22.1.x86_64" }, "product_reference": "rust-1.53.0-22.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "rust-analysis-1.53.0-22.1.x86_64 as component of SUSE Linux Enterprise Real Time 15 SP2", "product_id": "SUSE Linux Enterprise Real Time 15 SP2:rust-analysis-1.53.0-22.1.x86_64" }, "product_reference": "rust-analysis-1.53.0-22.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "rust-src-1.53.0-22.1.noarch as component of SUSE Linux Enterprise Real Time 15 SP2", "product_id": "SUSE Linux Enterprise Real Time 15 SP2:rust-src-1.53.0-22.1.noarch" }, "product_reference": "rust-src-1.53.0-22.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "cargo-1.53.0-22.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-BCL", "product_id": "SUSE Linux Enterprise Server 15 SP1-BCL:cargo-1.53.0-22.1.x86_64" }, "product_reference": "cargo-1.53.0-22.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "rls-1.53.0-22.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-BCL", "product_id": "SUSE Linux Enterprise Server 15 SP1-BCL:rls-1.53.0-22.1.x86_64" }, "product_reference": "rls-1.53.0-22.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "rust-1.53.0-22.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-BCL", "product_id": "SUSE Linux Enterprise Server 15 SP1-BCL:rust-1.53.0-22.1.x86_64" }, "product_reference": "rust-1.53.0-22.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "rust-analysis-1.53.0-22.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-BCL", "product_id": "SUSE Linux Enterprise Server 15 SP1-BCL:rust-analysis-1.53.0-22.1.x86_64" }, "product_reference": "rust-analysis-1.53.0-22.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "rust-src-1.53.0-22.1.noarch as component of SUSE Linux Enterprise Server 15 SP1-BCL", "product_id": "SUSE Linux Enterprise Server 15 SP1-BCL:rust-src-1.53.0-22.1.noarch" }, "product_reference": "rust-src-1.53.0-22.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "cargo-1.53.0-22.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:cargo-1.53.0-22.1.aarch64" }, "product_reference": "cargo-1.53.0-22.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "cargo-1.53.0-22.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:cargo-1.53.0-22.1.ppc64le" }, "product_reference": "cargo-1.53.0-22.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "cargo-1.53.0-22.1.s390x as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:cargo-1.53.0-22.1.s390x" }, "product_reference": "cargo-1.53.0-22.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "cargo-1.53.0-22.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:cargo-1.53.0-22.1.x86_64" }, "product_reference": "cargo-1.53.0-22.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "rls-1.53.0-22.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:rls-1.53.0-22.1.aarch64" }, "product_reference": "rls-1.53.0-22.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "rls-1.53.0-22.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:rls-1.53.0-22.1.x86_64" }, "product_reference": "rls-1.53.0-22.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "rust-1.53.0-22.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:rust-1.53.0-22.1.aarch64" }, "product_reference": "rust-1.53.0-22.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "rust-1.53.0-22.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:rust-1.53.0-22.1.ppc64le" }, "product_reference": "rust-1.53.0-22.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "rust-1.53.0-22.1.s390x as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:rust-1.53.0-22.1.s390x" }, "product_reference": "rust-1.53.0-22.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "rust-1.53.0-22.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:rust-1.53.0-22.1.x86_64" }, "product_reference": "rust-1.53.0-22.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "rust-analysis-1.53.0-22.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:rust-analysis-1.53.0-22.1.aarch64" }, "product_reference": "rust-analysis-1.53.0-22.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "rust-analysis-1.53.0-22.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:rust-analysis-1.53.0-22.1.x86_64" }, "product_reference": "rust-analysis-1.53.0-22.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "rust-src-1.53.0-22.1.noarch as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:rust-src-1.53.0-22.1.noarch" }, "product_reference": "rust-src-1.53.0-22.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "cargo-1.53.0-22.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 15 SP2-BCL:cargo-1.53.0-22.1.x86_64" }, "product_reference": "cargo-1.53.0-22.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "rls-1.53.0-22.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 15 SP2-BCL:rls-1.53.0-22.1.x86_64" }, "product_reference": "rls-1.53.0-22.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "rust-1.53.0-22.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 15 SP2-BCL:rust-1.53.0-22.1.x86_64" }, "product_reference": "rust-1.53.0-22.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "rust-analysis-1.53.0-22.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 15 SP2-BCL:rust-analysis-1.53.0-22.1.x86_64" }, "product_reference": "rust-analysis-1.53.0-22.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "rust-src-1.53.0-22.1.noarch as component of SUSE Linux Enterprise Server 15 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 15 SP2-BCL:rust-src-1.53.0-22.1.noarch" }, "product_reference": "rust-src-1.53.0-22.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "cargo-1.53.0-22.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:cargo-1.53.0-22.1.aarch64" }, "product_reference": "cargo-1.53.0-22.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "cargo-1.53.0-22.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:cargo-1.53.0-22.1.ppc64le" }, "product_reference": "cargo-1.53.0-22.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "cargo-1.53.0-22.1.s390x as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:cargo-1.53.0-22.1.s390x" }, "product_reference": "cargo-1.53.0-22.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "cargo-1.53.0-22.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:cargo-1.53.0-22.1.x86_64" }, "product_reference": "cargo-1.53.0-22.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "rls-1.53.0-22.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:rls-1.53.0-22.1.aarch64" }, "product_reference": "rls-1.53.0-22.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "rls-1.53.0-22.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:rls-1.53.0-22.1.x86_64" }, "product_reference": "rls-1.53.0-22.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "rust-1.53.0-22.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:rust-1.53.0-22.1.aarch64" }, "product_reference": "rust-1.53.0-22.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "rust-1.53.0-22.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:rust-1.53.0-22.1.ppc64le" }, "product_reference": "rust-1.53.0-22.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "rust-1.53.0-22.1.s390x as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:rust-1.53.0-22.1.s390x" }, "product_reference": "rust-1.53.0-22.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "rust-1.53.0-22.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:rust-1.53.0-22.1.x86_64" }, "product_reference": "rust-1.53.0-22.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "rust-analysis-1.53.0-22.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:rust-analysis-1.53.0-22.1.aarch64" }, "product_reference": "rust-analysis-1.53.0-22.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "rust-analysis-1.53.0-22.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:rust-analysis-1.53.0-22.1.x86_64" }, "product_reference": "rust-analysis-1.53.0-22.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "rust-src-1.53.0-22.1.noarch as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:rust-src-1.53.0-22.1.noarch" }, "product_reference": "rust-src-1.53.0-22.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "cargo-1.53.0-22.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:cargo-1.53.0-22.1.ppc64le" }, "product_reference": "cargo-1.53.0-22.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "cargo-1.53.0-22.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:cargo-1.53.0-22.1.x86_64" }, "product_reference": "cargo-1.53.0-22.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "rls-1.53.0-22.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:rls-1.53.0-22.1.x86_64" }, "product_reference": "rls-1.53.0-22.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "rust-1.53.0-22.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:rust-1.53.0-22.1.ppc64le" }, "product_reference": "rust-1.53.0-22.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "rust-1.53.0-22.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:rust-1.53.0-22.1.x86_64" }, "product_reference": "rust-1.53.0-22.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "rust-analysis-1.53.0-22.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:rust-analysis-1.53.0-22.1.x86_64" }, "product_reference": "rust-analysis-1.53.0-22.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "rust-src-1.53.0-22.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:rust-src-1.53.0-22.1.noarch" }, "product_reference": "rust-src-1.53.0-22.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "cargo-1.53.0-22.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:cargo-1.53.0-22.1.ppc64le" }, "product_reference": "cargo-1.53.0-22.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "cargo-1.53.0-22.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:cargo-1.53.0-22.1.x86_64" }, "product_reference": "cargo-1.53.0-22.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "rls-1.53.0-22.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:rls-1.53.0-22.1.x86_64" }, "product_reference": "rls-1.53.0-22.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "rust-1.53.0-22.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:rust-1.53.0-22.1.ppc64le" }, "product_reference": "rust-1.53.0-22.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "rust-1.53.0-22.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:rust-1.53.0-22.1.x86_64" }, "product_reference": "rust-1.53.0-22.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "rust-analysis-1.53.0-22.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:rust-analysis-1.53.0-22.1.x86_64" }, "product_reference": "rust-analysis-1.53.0-22.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "rust-src-1.53.0-22.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:rust-src-1.53.0-22.1.noarch" }, "product_reference": "rust-src-1.53.0-22.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "cargo-1.53.0-22.1.x86_64 as component of SUSE Manager Proxy 4.1", "product_id": "SUSE Manager Proxy 4.1:cargo-1.53.0-22.1.x86_64" }, "product_reference": "cargo-1.53.0-22.1.x86_64", "relates_to_product_reference": "SUSE Manager Proxy 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "rls-1.53.0-22.1.x86_64 as component of SUSE Manager Proxy 4.1", "product_id": "SUSE Manager Proxy 4.1:rls-1.53.0-22.1.x86_64" }, "product_reference": "rls-1.53.0-22.1.x86_64", "relates_to_product_reference": "SUSE Manager Proxy 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "rust-1.53.0-22.1.x86_64 as component of SUSE Manager Proxy 4.1", "product_id": "SUSE Manager Proxy 4.1:rust-1.53.0-22.1.x86_64" }, "product_reference": "rust-1.53.0-22.1.x86_64", "relates_to_product_reference": "SUSE Manager Proxy 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "rust-analysis-1.53.0-22.1.x86_64 as component of SUSE Manager Proxy 4.1", "product_id": "SUSE Manager Proxy 4.1:rust-analysis-1.53.0-22.1.x86_64" }, "product_reference": "rust-analysis-1.53.0-22.1.x86_64", "relates_to_product_reference": "SUSE Manager Proxy 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "rust-src-1.53.0-22.1.noarch as component of SUSE Manager Proxy 4.1", "product_id": "SUSE Manager Proxy 4.1:rust-src-1.53.0-22.1.noarch" }, "product_reference": "rust-src-1.53.0-22.1.noarch", "relates_to_product_reference": "SUSE Manager Proxy 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "cargo-1.53.0-22.1.x86_64 as component of SUSE Manager Retail Branch Server 4.1", "product_id": "SUSE Manager Retail Branch Server 4.1:cargo-1.53.0-22.1.x86_64" }, "product_reference": "cargo-1.53.0-22.1.x86_64", "relates_to_product_reference": "SUSE Manager Retail Branch Server 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "rls-1.53.0-22.1.x86_64 as component of SUSE Manager Retail Branch Server 4.1", "product_id": "SUSE Manager Retail Branch Server 4.1:rls-1.53.0-22.1.x86_64" }, "product_reference": "rls-1.53.0-22.1.x86_64", "relates_to_product_reference": "SUSE Manager Retail Branch Server 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "rust-1.53.0-22.1.x86_64 as component of SUSE Manager Retail Branch Server 4.1", "product_id": "SUSE Manager Retail Branch Server 4.1:rust-1.53.0-22.1.x86_64" }, "product_reference": "rust-1.53.0-22.1.x86_64", "relates_to_product_reference": "SUSE Manager Retail Branch Server 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "rust-analysis-1.53.0-22.1.x86_64 as component of SUSE Manager Retail Branch Server 4.1", "product_id": "SUSE Manager Retail Branch Server 4.1:rust-analysis-1.53.0-22.1.x86_64" }, "product_reference": "rust-analysis-1.53.0-22.1.x86_64", "relates_to_product_reference": "SUSE Manager Retail Branch Server 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "rust-src-1.53.0-22.1.noarch as component of SUSE Manager Retail Branch Server 4.1", "product_id": "SUSE Manager Retail Branch Server 4.1:rust-src-1.53.0-22.1.noarch" }, "product_reference": "rust-src-1.53.0-22.1.noarch", "relates_to_product_reference": "SUSE Manager Retail Branch Server 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "cargo-1.53.0-22.1.ppc64le as component of SUSE Manager Server 4.1", "product_id": "SUSE Manager Server 4.1:cargo-1.53.0-22.1.ppc64le" }, "product_reference": "cargo-1.53.0-22.1.ppc64le", "relates_to_product_reference": "SUSE Manager Server 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "cargo-1.53.0-22.1.s390x as component of SUSE Manager Server 4.1", "product_id": "SUSE Manager Server 4.1:cargo-1.53.0-22.1.s390x" }, "product_reference": "cargo-1.53.0-22.1.s390x", "relates_to_product_reference": "SUSE Manager Server 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "cargo-1.53.0-22.1.x86_64 as component of SUSE Manager Server 4.1", "product_id": "SUSE Manager Server 4.1:cargo-1.53.0-22.1.x86_64" }, "product_reference": "cargo-1.53.0-22.1.x86_64", "relates_to_product_reference": "SUSE Manager Server 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "rls-1.53.0-22.1.x86_64 as component of SUSE Manager Server 4.1", "product_id": "SUSE Manager Server 4.1:rls-1.53.0-22.1.x86_64" }, "product_reference": "rls-1.53.0-22.1.x86_64", "relates_to_product_reference": "SUSE Manager Server 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "rust-1.53.0-22.1.ppc64le as component of SUSE Manager Server 4.1", "product_id": "SUSE Manager Server 4.1:rust-1.53.0-22.1.ppc64le" }, "product_reference": "rust-1.53.0-22.1.ppc64le", "relates_to_product_reference": "SUSE Manager Server 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "rust-1.53.0-22.1.s390x as component of SUSE Manager Server 4.1", "product_id": "SUSE Manager Server 4.1:rust-1.53.0-22.1.s390x" }, "product_reference": "rust-1.53.0-22.1.s390x", "relates_to_product_reference": "SUSE Manager Server 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "rust-1.53.0-22.1.x86_64 as component of SUSE Manager Server 4.1", "product_id": "SUSE Manager Server 4.1:rust-1.53.0-22.1.x86_64" }, "product_reference": "rust-1.53.0-22.1.x86_64", "relates_to_product_reference": "SUSE Manager Server 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "rust-analysis-1.53.0-22.1.x86_64 as component of SUSE Manager Server 4.1", "product_id": "SUSE Manager Server 4.1:rust-analysis-1.53.0-22.1.x86_64" }, "product_reference": "rust-analysis-1.53.0-22.1.x86_64", "relates_to_product_reference": "SUSE Manager Server 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "rust-src-1.53.0-22.1.noarch as component of SUSE Manager Server 4.1", "product_id": "SUSE Manager Server 4.1:rust-src-1.53.0-22.1.noarch" }, "product_reference": "rust-src-1.53.0-22.1.noarch", "relates_to_product_reference": "SUSE Manager Server 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "cargo-1.53.0-22.1.aarch64 as component of SUSE Enterprise Storage 6", "product_id": "SUSE Enterprise Storage 6:cargo-1.53.0-22.1.aarch64" }, "product_reference": "cargo-1.53.0-22.1.aarch64", "relates_to_product_reference": "SUSE Enterprise Storage 6" }, { "category": "default_component_of", "full_product_name": { "name": "cargo-1.53.0-22.1.x86_64 as component of SUSE Enterprise Storage 6", "product_id": "SUSE Enterprise Storage 6:cargo-1.53.0-22.1.x86_64" }, "product_reference": "cargo-1.53.0-22.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 6" }, { "category": "default_component_of", "full_product_name": { "name": "rls-1.53.0-22.1.aarch64 as component of SUSE Enterprise Storage 6", "product_id": "SUSE Enterprise Storage 6:rls-1.53.0-22.1.aarch64" }, "product_reference": "rls-1.53.0-22.1.aarch64", "relates_to_product_reference": "SUSE Enterprise Storage 6" }, { "category": "default_component_of", "full_product_name": { "name": "rls-1.53.0-22.1.x86_64 as component of SUSE Enterprise Storage 6", "product_id": "SUSE Enterprise Storage 6:rls-1.53.0-22.1.x86_64" }, "product_reference": "rls-1.53.0-22.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 6" }, { "category": "default_component_of", "full_product_name": { "name": "rust-1.53.0-22.1.aarch64 as component of SUSE Enterprise Storage 6", "product_id": "SUSE Enterprise Storage 6:rust-1.53.0-22.1.aarch64" }, "product_reference": "rust-1.53.0-22.1.aarch64", "relates_to_product_reference": "SUSE Enterprise Storage 6" }, { "category": "default_component_of", "full_product_name": { "name": "rust-1.53.0-22.1.x86_64 as component of SUSE Enterprise Storage 6", "product_id": "SUSE Enterprise Storage 6:rust-1.53.0-22.1.x86_64" }, "product_reference": "rust-1.53.0-22.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 6" }, { "category": "default_component_of", "full_product_name": { "name": "rust-analysis-1.53.0-22.1.aarch64 as component of SUSE Enterprise Storage 6", "product_id": "SUSE Enterprise Storage 6:rust-analysis-1.53.0-22.1.aarch64" }, "product_reference": "rust-analysis-1.53.0-22.1.aarch64", "relates_to_product_reference": "SUSE Enterprise Storage 6" }, { "category": "default_component_of", "full_product_name": { "name": "rust-analysis-1.53.0-22.1.x86_64 as component of SUSE Enterprise Storage 6", "product_id": "SUSE Enterprise Storage 6:rust-analysis-1.53.0-22.1.x86_64" }, "product_reference": "rust-analysis-1.53.0-22.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 6" }, { "category": "default_component_of", "full_product_name": { "name": "rust-src-1.53.0-22.1.noarch as component of SUSE Enterprise Storage 6", "product_id": "SUSE Enterprise Storage 6:rust-src-1.53.0-22.1.noarch" }, "product_reference": "rust-src-1.53.0-22.1.noarch", "relates_to_product_reference": "SUSE Enterprise Storage 6" }, { "category": "default_component_of", "full_product_name": { "name": "cargo-1.53.0-22.1.aarch64 as component of SUSE Enterprise Storage 7", "product_id": "SUSE Enterprise Storage 7:cargo-1.53.0-22.1.aarch64" }, "product_reference": "cargo-1.53.0-22.1.aarch64", "relates_to_product_reference": "SUSE Enterprise Storage 7" }, { "category": "default_component_of", "full_product_name": { "name": "cargo-1.53.0-22.1.x86_64 as component of SUSE Enterprise Storage 7", "product_id": "SUSE Enterprise Storage 7:cargo-1.53.0-22.1.x86_64" }, "product_reference": "cargo-1.53.0-22.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 7" }, { "category": "default_component_of", "full_product_name": { "name": "rls-1.53.0-22.1.aarch64 as component of SUSE Enterprise Storage 7", "product_id": "SUSE Enterprise Storage 7:rls-1.53.0-22.1.aarch64" }, "product_reference": "rls-1.53.0-22.1.aarch64", "relates_to_product_reference": "SUSE Enterprise Storage 7" }, { "category": "default_component_of", "full_product_name": { "name": "rls-1.53.0-22.1.x86_64 as component of SUSE Enterprise Storage 7", "product_id": "SUSE Enterprise Storage 7:rls-1.53.0-22.1.x86_64" }, "product_reference": "rls-1.53.0-22.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 7" }, { "category": "default_component_of", "full_product_name": { "name": "rust-1.53.0-22.1.aarch64 as component of SUSE Enterprise Storage 7", "product_id": "SUSE Enterprise Storage 7:rust-1.53.0-22.1.aarch64" }, "product_reference": "rust-1.53.0-22.1.aarch64", "relates_to_product_reference": "SUSE Enterprise Storage 7" }, { "category": "default_component_of", "full_product_name": { "name": "rust-1.53.0-22.1.x86_64 as component of SUSE Enterprise Storage 7", "product_id": "SUSE Enterprise Storage 7:rust-1.53.0-22.1.x86_64" }, "product_reference": "rust-1.53.0-22.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 7" }, { "category": "default_component_of", "full_product_name": { "name": "rust-analysis-1.53.0-22.1.aarch64 as component of SUSE Enterprise Storage 7", "product_id": "SUSE Enterprise Storage 7:rust-analysis-1.53.0-22.1.aarch64" }, "product_reference": "rust-analysis-1.53.0-22.1.aarch64", "relates_to_product_reference": "SUSE Enterprise Storage 7" }, { "category": "default_component_of", "full_product_name": { "name": "rust-analysis-1.53.0-22.1.x86_64 as component of SUSE Enterprise Storage 7", "product_id": "SUSE Enterprise Storage 7:rust-analysis-1.53.0-22.1.x86_64" }, "product_reference": "rust-analysis-1.53.0-22.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 7" }, { "category": "default_component_of", "full_product_name": { "name": "rust-src-1.53.0-22.1.noarch as component of SUSE Enterprise Storage 7", "product_id": "SUSE Enterprise Storage 7:rust-src-1.53.0-22.1.noarch" }, "product_reference": "rust-src-1.53.0-22.1.noarch", "relates_to_product_reference": "SUSE Enterprise Storage 7" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-21658", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-21658" } ], "notes": [ { "category": "general", "text": "Rust is a multi-paradigm, general-purpose programming language designed for performance and safety, especially safe concurrency. The Rust Security Response WG was notified that the `std::fs::remove_dir_all` standard library function is vulnerable a race condition enabling symlink following (CWE-363). An attacker could use this security issue to trick a privileged program into deleting files and directories the attacker couldn\u0027t otherwise access or delete. Rust 1.0.0 through Rust 1.58.0 is affected by this vulnerability with 1.58.1 containing a patch. Note that the following build targets don\u0027t have usable APIs to properly mitigate the attack, and are thus still vulnerable even with a patched toolchain: macOS before version 10.10 (Yosemite) and REDOX. We recommend everyone to update to Rust 1.58.1 as soon as possible, especially people developing programs expected to run in privileged contexts (including system daemons and setuid binaries), as those have the highest risk of being affected by this. Note that adding checks in your codebase before calling remove_dir_all will not mitigate the vulnerability, as they would also be vulnerable to race conditions like remove_dir_all itself. The existing mitigation is working as intended outside of race conditions.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 6:cargo-1.53.0-22.1.aarch64", "SUSE Enterprise Storage 6:cargo-1.53.0-22.1.x86_64", "SUSE Enterprise Storage 6:rls-1.53.0-22.1.aarch64", "SUSE Enterprise Storage 6:rls-1.53.0-22.1.x86_64", "SUSE Enterprise Storage 6:rust-1.53.0-22.1.aarch64", "SUSE Enterprise Storage 6:rust-1.53.0-22.1.x86_64", "SUSE Enterprise Storage 6:rust-analysis-1.53.0-22.1.aarch64", "SUSE Enterprise Storage 6:rust-analysis-1.53.0-22.1.x86_64", "SUSE Enterprise Storage 6:rust-src-1.53.0-22.1.noarch", "SUSE Enterprise Storage 7:cargo-1.53.0-22.1.aarch64", "SUSE Enterprise Storage 7:cargo-1.53.0-22.1.x86_64", "SUSE Enterprise Storage 7:rls-1.53.0-22.1.aarch64", "SUSE Enterprise Storage 7:rls-1.53.0-22.1.x86_64", "SUSE Enterprise Storage 7:rust-1.53.0-22.1.aarch64", "SUSE Enterprise Storage 7:rust-1.53.0-22.1.x86_64", "SUSE Enterprise Storage 7:rust-analysis-1.53.0-22.1.aarch64", "SUSE Enterprise Storage 7:rust-analysis-1.53.0-22.1.x86_64", "SUSE Enterprise Storage 7:rust-src-1.53.0-22.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:cargo-1.53.0-22.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:cargo-1.53.0-22.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:rls-1.53.0-22.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:rls-1.53.0-22.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:rust-1.53.0-22.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:rust-1.53.0-22.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:rust-analysis-1.53.0-22.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:rust-analysis-1.53.0-22.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:rust-src-1.53.0-22.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:cargo-1.53.0-22.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:cargo-1.53.0-22.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:rls-1.53.0-22.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:rls-1.53.0-22.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:rust-1.53.0-22.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:rust-1.53.0-22.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:rust-analysis-1.53.0-22.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:rust-analysis-1.53.0-22.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:rust-src-1.53.0-22.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:cargo-1.53.0-22.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:cargo-1.53.0-22.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:rls-1.53.0-22.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:rls-1.53.0-22.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:rust-1.53.0-22.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:rust-1.53.0-22.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:rust-analysis-1.53.0-22.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:rust-analysis-1.53.0-22.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:rust-src-1.53.0-22.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:cargo-1.53.0-22.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:cargo-1.53.0-22.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:rls-1.53.0-22.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:rls-1.53.0-22.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:rust-1.53.0-22.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:rust-1.53.0-22.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:rust-analysis-1.53.0-22.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:rust-analysis-1.53.0-22.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:rust-src-1.53.0-22.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:cargo-1.53.0-22.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:rls-1.53.0-22.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:rust-1.53.0-22.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:rust-analysis-1.53.0-22.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:rust-src-1.53.0-22.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:cargo-1.53.0-22.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:rls-1.53.0-22.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:rust-1.53.0-22.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:rust-analysis-1.53.0-22.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:rust-src-1.53.0-22.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:cargo-1.53.0-22.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:cargo-1.53.0-22.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:cargo-1.53.0-22.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:cargo-1.53.0-22.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:rls-1.53.0-22.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:rls-1.53.0-22.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:rust-1.53.0-22.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:rust-1.53.0-22.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:rust-1.53.0-22.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:rust-1.53.0-22.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:rust-analysis-1.53.0-22.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:rust-analysis-1.53.0-22.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:rust-src-1.53.0-22.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:cargo-1.53.0-22.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:rls-1.53.0-22.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:rust-1.53.0-22.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:rust-analysis-1.53.0-22.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:rust-src-1.53.0-22.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:cargo-1.53.0-22.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:cargo-1.53.0-22.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:cargo-1.53.0-22.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:cargo-1.53.0-22.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:rls-1.53.0-22.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:rls-1.53.0-22.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:rust-1.53.0-22.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:rust-1.53.0-22.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:rust-1.53.0-22.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:rust-1.53.0-22.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:rust-analysis-1.53.0-22.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:rust-analysis-1.53.0-22.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:rust-src-1.53.0-22.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:cargo-1.53.0-22.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:cargo-1.53.0-22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:rls-1.53.0-22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:rust-1.53.0-22.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:rust-1.53.0-22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:rust-analysis-1.53.0-22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:rust-src-1.53.0-22.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:cargo-1.53.0-22.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:cargo-1.53.0-22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:rls-1.53.0-22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:rust-1.53.0-22.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:rust-1.53.0-22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:rust-analysis-1.53.0-22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:rust-src-1.53.0-22.1.noarch", "SUSE Manager Proxy 4.1:cargo-1.53.0-22.1.x86_64", "SUSE Manager Proxy 4.1:rls-1.53.0-22.1.x86_64", "SUSE Manager Proxy 4.1:rust-1.53.0-22.1.x86_64", "SUSE Manager Proxy 4.1:rust-analysis-1.53.0-22.1.x86_64", "SUSE Manager Proxy 4.1:rust-src-1.53.0-22.1.noarch", "SUSE Manager Retail Branch Server 4.1:cargo-1.53.0-22.1.x86_64", "SUSE Manager Retail Branch Server 4.1:rls-1.53.0-22.1.x86_64", "SUSE Manager Retail Branch Server 4.1:rust-1.53.0-22.1.x86_64", "SUSE Manager Retail Branch Server 4.1:rust-analysis-1.53.0-22.1.x86_64", "SUSE Manager Retail Branch Server 4.1:rust-src-1.53.0-22.1.noarch", "SUSE Manager Server 4.1:cargo-1.53.0-22.1.ppc64le", "SUSE Manager Server 4.1:cargo-1.53.0-22.1.s390x", "SUSE Manager Server 4.1:cargo-1.53.0-22.1.x86_64", "SUSE Manager Server 4.1:rls-1.53.0-22.1.x86_64", "SUSE Manager Server 4.1:rust-1.53.0-22.1.ppc64le", "SUSE Manager Server 4.1:rust-1.53.0-22.1.s390x", "SUSE Manager Server 4.1:rust-1.53.0-22.1.x86_64", "SUSE Manager Server 4.1:rust-analysis-1.53.0-22.1.x86_64", "SUSE Manager Server 4.1:rust-src-1.53.0-22.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2022-21658", "url": "https://www.suse.com/security/cve/CVE-2022-21658" }, { "category": "external", "summary": "SUSE Bug 1194767 for CVE-2022-21658", "url": "https://bugzilla.suse.com/1194767" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 6:cargo-1.53.0-22.1.aarch64", "SUSE Enterprise Storage 6:cargo-1.53.0-22.1.x86_64", "SUSE Enterprise Storage 6:rls-1.53.0-22.1.aarch64", "SUSE Enterprise Storage 6:rls-1.53.0-22.1.x86_64", "SUSE Enterprise Storage 6:rust-1.53.0-22.1.aarch64", "SUSE Enterprise Storage 6:rust-1.53.0-22.1.x86_64", "SUSE Enterprise Storage 6:rust-analysis-1.53.0-22.1.aarch64", "SUSE Enterprise Storage 6:rust-analysis-1.53.0-22.1.x86_64", "SUSE Enterprise Storage 6:rust-src-1.53.0-22.1.noarch", "SUSE Enterprise Storage 7:cargo-1.53.0-22.1.aarch64", "SUSE Enterprise Storage 7:cargo-1.53.0-22.1.x86_64", "SUSE Enterprise Storage 7:rls-1.53.0-22.1.aarch64", "SUSE Enterprise Storage 7:rls-1.53.0-22.1.x86_64", "SUSE Enterprise Storage 7:rust-1.53.0-22.1.aarch64", "SUSE Enterprise Storage 7:rust-1.53.0-22.1.x86_64", "SUSE Enterprise Storage 7:rust-analysis-1.53.0-22.1.aarch64", "SUSE Enterprise Storage 7:rust-analysis-1.53.0-22.1.x86_64", "SUSE Enterprise Storage 7:rust-src-1.53.0-22.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:cargo-1.53.0-22.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:cargo-1.53.0-22.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:rls-1.53.0-22.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:rls-1.53.0-22.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:rust-1.53.0-22.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:rust-1.53.0-22.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:rust-analysis-1.53.0-22.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:rust-analysis-1.53.0-22.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:rust-src-1.53.0-22.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:cargo-1.53.0-22.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:cargo-1.53.0-22.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:rls-1.53.0-22.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:rls-1.53.0-22.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:rust-1.53.0-22.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:rust-1.53.0-22.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:rust-analysis-1.53.0-22.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:rust-analysis-1.53.0-22.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:rust-src-1.53.0-22.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:cargo-1.53.0-22.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:cargo-1.53.0-22.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:rls-1.53.0-22.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:rls-1.53.0-22.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:rust-1.53.0-22.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:rust-1.53.0-22.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:rust-analysis-1.53.0-22.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:rust-analysis-1.53.0-22.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:rust-src-1.53.0-22.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:cargo-1.53.0-22.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:cargo-1.53.0-22.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:rls-1.53.0-22.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:rls-1.53.0-22.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:rust-1.53.0-22.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:rust-1.53.0-22.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:rust-analysis-1.53.0-22.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:rust-analysis-1.53.0-22.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:rust-src-1.53.0-22.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:cargo-1.53.0-22.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:rls-1.53.0-22.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:rust-1.53.0-22.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:rust-analysis-1.53.0-22.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:rust-src-1.53.0-22.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:cargo-1.53.0-22.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:rls-1.53.0-22.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:rust-1.53.0-22.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:rust-analysis-1.53.0-22.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:rust-src-1.53.0-22.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:cargo-1.53.0-22.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:cargo-1.53.0-22.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:cargo-1.53.0-22.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:cargo-1.53.0-22.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:rls-1.53.0-22.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:rls-1.53.0-22.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:rust-1.53.0-22.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:rust-1.53.0-22.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:rust-1.53.0-22.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:rust-1.53.0-22.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:rust-analysis-1.53.0-22.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:rust-analysis-1.53.0-22.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:rust-src-1.53.0-22.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:cargo-1.53.0-22.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:rls-1.53.0-22.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:rust-1.53.0-22.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:rust-analysis-1.53.0-22.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:rust-src-1.53.0-22.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:cargo-1.53.0-22.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:cargo-1.53.0-22.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:cargo-1.53.0-22.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:cargo-1.53.0-22.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:rls-1.53.0-22.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:rls-1.53.0-22.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:rust-1.53.0-22.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:rust-1.53.0-22.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:rust-1.53.0-22.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:rust-1.53.0-22.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:rust-analysis-1.53.0-22.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:rust-analysis-1.53.0-22.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:rust-src-1.53.0-22.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:cargo-1.53.0-22.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:cargo-1.53.0-22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:rls-1.53.0-22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:rust-1.53.0-22.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:rust-1.53.0-22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:rust-analysis-1.53.0-22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:rust-src-1.53.0-22.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:cargo-1.53.0-22.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:cargo-1.53.0-22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:rls-1.53.0-22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:rust-1.53.0-22.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:rust-1.53.0-22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:rust-analysis-1.53.0-22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:rust-src-1.53.0-22.1.noarch", "SUSE Manager Proxy 4.1:cargo-1.53.0-22.1.x86_64", "SUSE Manager Proxy 4.1:rls-1.53.0-22.1.x86_64", "SUSE Manager Proxy 4.1:rust-1.53.0-22.1.x86_64", "SUSE Manager Proxy 4.1:rust-analysis-1.53.0-22.1.x86_64", "SUSE Manager Proxy 4.1:rust-src-1.53.0-22.1.noarch", "SUSE Manager Retail Branch Server 4.1:cargo-1.53.0-22.1.x86_64", "SUSE Manager Retail Branch Server 4.1:rls-1.53.0-22.1.x86_64", "SUSE Manager Retail Branch Server 4.1:rust-1.53.0-22.1.x86_64", "SUSE Manager Retail Branch Server 4.1:rust-analysis-1.53.0-22.1.x86_64", "SUSE Manager Retail Branch Server 4.1:rust-src-1.53.0-22.1.noarch", "SUSE Manager Server 4.1:cargo-1.53.0-22.1.ppc64le", "SUSE Manager Server 4.1:cargo-1.53.0-22.1.s390x", "SUSE Manager Server 4.1:cargo-1.53.0-22.1.x86_64", "SUSE Manager Server 4.1:rls-1.53.0-22.1.x86_64", "SUSE Manager Server 4.1:rust-1.53.0-22.1.ppc64le", "SUSE Manager Server 4.1:rust-1.53.0-22.1.s390x", "SUSE Manager Server 4.1:rust-1.53.0-22.1.x86_64", "SUSE Manager Server 4.1:rust-analysis-1.53.0-22.1.x86_64", "SUSE Manager Server 4.1:rust-src-1.53.0-22.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 6:cargo-1.53.0-22.1.aarch64", "SUSE Enterprise Storage 6:cargo-1.53.0-22.1.x86_64", "SUSE Enterprise Storage 6:rls-1.53.0-22.1.aarch64", "SUSE Enterprise Storage 6:rls-1.53.0-22.1.x86_64", "SUSE Enterprise Storage 6:rust-1.53.0-22.1.aarch64", "SUSE Enterprise Storage 6:rust-1.53.0-22.1.x86_64", "SUSE Enterprise Storage 6:rust-analysis-1.53.0-22.1.aarch64", "SUSE Enterprise Storage 6:rust-analysis-1.53.0-22.1.x86_64", "SUSE Enterprise Storage 6:rust-src-1.53.0-22.1.noarch", "SUSE Enterprise Storage 7:cargo-1.53.0-22.1.aarch64", "SUSE Enterprise Storage 7:cargo-1.53.0-22.1.x86_64", "SUSE Enterprise Storage 7:rls-1.53.0-22.1.aarch64", "SUSE Enterprise Storage 7:rls-1.53.0-22.1.x86_64", "SUSE Enterprise Storage 7:rust-1.53.0-22.1.aarch64", "SUSE Enterprise Storage 7:rust-1.53.0-22.1.x86_64", "SUSE Enterprise Storage 7:rust-analysis-1.53.0-22.1.aarch64", "SUSE Enterprise Storage 7:rust-analysis-1.53.0-22.1.x86_64", "SUSE Enterprise Storage 7:rust-src-1.53.0-22.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:cargo-1.53.0-22.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:cargo-1.53.0-22.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:rls-1.53.0-22.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:rls-1.53.0-22.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:rust-1.53.0-22.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:rust-1.53.0-22.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:rust-analysis-1.53.0-22.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:rust-analysis-1.53.0-22.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:rust-src-1.53.0-22.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:cargo-1.53.0-22.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:cargo-1.53.0-22.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:rls-1.53.0-22.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:rls-1.53.0-22.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:rust-1.53.0-22.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:rust-1.53.0-22.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:rust-analysis-1.53.0-22.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:rust-analysis-1.53.0-22.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:rust-src-1.53.0-22.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:cargo-1.53.0-22.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:cargo-1.53.0-22.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:rls-1.53.0-22.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:rls-1.53.0-22.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:rust-1.53.0-22.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:rust-1.53.0-22.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:rust-analysis-1.53.0-22.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:rust-analysis-1.53.0-22.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:rust-src-1.53.0-22.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:cargo-1.53.0-22.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:cargo-1.53.0-22.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:rls-1.53.0-22.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:rls-1.53.0-22.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:rust-1.53.0-22.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:rust-1.53.0-22.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:rust-analysis-1.53.0-22.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:rust-analysis-1.53.0-22.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:rust-src-1.53.0-22.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:cargo-1.53.0-22.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:rls-1.53.0-22.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:rust-1.53.0-22.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:rust-analysis-1.53.0-22.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:rust-src-1.53.0-22.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:cargo-1.53.0-22.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:rls-1.53.0-22.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:rust-1.53.0-22.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:rust-analysis-1.53.0-22.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:rust-src-1.53.0-22.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:cargo-1.53.0-22.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:cargo-1.53.0-22.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:cargo-1.53.0-22.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:cargo-1.53.0-22.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:rls-1.53.0-22.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:rls-1.53.0-22.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:rust-1.53.0-22.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:rust-1.53.0-22.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:rust-1.53.0-22.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:rust-1.53.0-22.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:rust-analysis-1.53.0-22.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:rust-analysis-1.53.0-22.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:rust-src-1.53.0-22.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:cargo-1.53.0-22.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:rls-1.53.0-22.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:rust-1.53.0-22.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:rust-analysis-1.53.0-22.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:rust-src-1.53.0-22.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:cargo-1.53.0-22.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:cargo-1.53.0-22.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:cargo-1.53.0-22.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:cargo-1.53.0-22.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:rls-1.53.0-22.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:rls-1.53.0-22.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:rust-1.53.0-22.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:rust-1.53.0-22.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:rust-1.53.0-22.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:rust-1.53.0-22.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:rust-analysis-1.53.0-22.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:rust-analysis-1.53.0-22.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:rust-src-1.53.0-22.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:cargo-1.53.0-22.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:cargo-1.53.0-22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:rls-1.53.0-22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:rust-1.53.0-22.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:rust-1.53.0-22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:rust-analysis-1.53.0-22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:rust-src-1.53.0-22.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:cargo-1.53.0-22.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:cargo-1.53.0-22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:rls-1.53.0-22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:rust-1.53.0-22.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:rust-1.53.0-22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:rust-analysis-1.53.0-22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:rust-src-1.53.0-22.1.noarch", "SUSE Manager Proxy 4.1:cargo-1.53.0-22.1.x86_64", "SUSE Manager Proxy 4.1:rls-1.53.0-22.1.x86_64", "SUSE Manager Proxy 4.1:rust-1.53.0-22.1.x86_64", "SUSE Manager Proxy 4.1:rust-analysis-1.53.0-22.1.x86_64", "SUSE Manager Proxy 4.1:rust-src-1.53.0-22.1.noarch", "SUSE Manager Retail Branch Server 4.1:cargo-1.53.0-22.1.x86_64", "SUSE Manager Retail Branch Server 4.1:rls-1.53.0-22.1.x86_64", "SUSE Manager Retail Branch Server 4.1:rust-1.53.0-22.1.x86_64", "SUSE Manager Retail Branch Server 4.1:rust-analysis-1.53.0-22.1.x86_64", "SUSE Manager Retail Branch Server 4.1:rust-src-1.53.0-22.1.noarch", "SUSE Manager Server 4.1:cargo-1.53.0-22.1.ppc64le", "SUSE Manager Server 4.1:cargo-1.53.0-22.1.s390x", "SUSE Manager Server 4.1:cargo-1.53.0-22.1.x86_64", "SUSE Manager Server 4.1:rls-1.53.0-22.1.x86_64", "SUSE Manager Server 4.1:rust-1.53.0-22.1.ppc64le", "SUSE Manager Server 4.1:rust-1.53.0-22.1.s390x", "SUSE Manager Server 4.1:rust-1.53.0-22.1.x86_64", "SUSE Manager Server 4.1:rust-analysis-1.53.0-22.1.x86_64", "SUSE Manager Server 4.1:rust-src-1.53.0-22.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2022-02-18T09:30:32Z", "details": "moderate" } ], "title": "CVE-2022-21658" } ] }
suse-su-2022:0200-1
Vulnerability from csaf_suse
Published
2022-01-26 10:34
Modified
2022-01-26 10:34
Summary
Security update for rust
Notes
Title of the patch
Security update for rust
Description of the patch
This update for rust fixes the following issues:
- CVE-2022-21658: Fixed race condition in std::fs::remove_dir_all (bsc#1194767).
Patchnames
SUSE-2022-200,SUSE-SLE-Product-HPC-15-2022-200,SUSE-SLE-Product-SLES-15-2022-200,SUSE-SLE-Product-SLES_SAP-15-2022-200
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for rust", "title": "Title of the patch" }, { "category": "description", "text": "This update for rust fixes the following issues:\n\n- CVE-2022-21658: Fixed race condition in std::fs::remove_dir_all (bsc#1194767).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2022-200,SUSE-SLE-Product-HPC-15-2022-200,SUSE-SLE-Product-SLES-15-2022-200,SUSE-SLE-Product-SLES_SAP-15-2022-200", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_0200-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2022:0200-1", "url": "https://www.suse.com/support/update/announcement/2022/suse-su-20220200-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2022:0200-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-January/010083.html" }, { "category": "self", "summary": "SUSE Bug 1194767", "url": "https://bugzilla.suse.com/1194767" }, { "category": "self", "summary": "SUSE CVE CVE-2022-21658 page", "url": "https://www.suse.com/security/cve/CVE-2022-21658/" } ], "title": "Security update for rust", "tracking": { "current_release_date": "2022-01-26T10:34:40Z", "generator": { "date": "2022-01-26T10:34:40Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2022:0200-1", "initial_release_date": "2022-01-26T10:34:40Z", "revision_history": [ { "date": "2022-01-26T10:34:40Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "cargo-1.53.0-3.40.1.aarch64", "product": { "name": "cargo-1.53.0-3.40.1.aarch64", "product_id": "cargo-1.53.0-3.40.1.aarch64" } }, { "category": "product_version", "name": "rls-1.53.0-3.40.1.aarch64", "product": { "name": "rls-1.53.0-3.40.1.aarch64", "product_id": "rls-1.53.0-3.40.1.aarch64" } }, { "category": "product_version", "name": "rust-1.53.0-3.40.1.aarch64", "product": { "name": "rust-1.53.0-3.40.1.aarch64", "product_id": "rust-1.53.0-3.40.1.aarch64" } }, { "category": "product_version", "name": "rust-analysis-1.53.0-3.40.1.aarch64", "product": { "name": "rust-analysis-1.53.0-3.40.1.aarch64", "product_id": "rust-analysis-1.53.0-3.40.1.aarch64" } }, { "category": "product_version", "name": "rust-doc-1.53.0-3.40.1.aarch64", "product": { "name": "rust-doc-1.53.0-3.40.1.aarch64", "product_id": "rust-doc-1.53.0-3.40.1.aarch64" } }, { "category": "product_version", "name": "rust-gdb-1.53.0-3.40.1.aarch64", "product": { "name": "rust-gdb-1.53.0-3.40.1.aarch64", "product_id": "rust-gdb-1.53.0-3.40.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "cargo-1.53.0-3.40.1.i586", "product": { "name": "cargo-1.53.0-3.40.1.i586", "product_id": "cargo-1.53.0-3.40.1.i586" } }, { "category": "product_version", "name": "rust-1.53.0-3.40.1.i586", "product": { "name": "rust-1.53.0-3.40.1.i586", "product_id": "rust-1.53.0-3.40.1.i586" } }, { "category": "product_version", "name": "rust-gdb-1.53.0-3.40.1.i586", "product": { "name": "rust-gdb-1.53.0-3.40.1.i586", "product_id": "rust-gdb-1.53.0-3.40.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "cargo-doc-1.53.0-3.40.1.noarch", "product": { "name": "cargo-doc-1.53.0-3.40.1.noarch", "product_id": "cargo-doc-1.53.0-3.40.1.noarch" } }, { "category": "product_version", "name": "rust-src-1.53.0-3.40.1.noarch", "product": { "name": "rust-src-1.53.0-3.40.1.noarch", "product_id": "rust-src-1.53.0-3.40.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "cargo-1.53.0-3.40.1.ppc64le", "product": { "name": "cargo-1.53.0-3.40.1.ppc64le", "product_id": "cargo-1.53.0-3.40.1.ppc64le" } }, { "category": "product_version", "name": "rust-1.53.0-3.40.1.ppc64le", "product": { "name": "rust-1.53.0-3.40.1.ppc64le", "product_id": "rust-1.53.0-3.40.1.ppc64le" } }, { "category": "product_version", "name": "rust-gdb-1.53.0-3.40.1.ppc64le", "product": { "name": "rust-gdb-1.53.0-3.40.1.ppc64le", "product_id": "rust-gdb-1.53.0-3.40.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "cargo-1.53.0-3.40.1.s390x", "product": { "name": "cargo-1.53.0-3.40.1.s390x", "product_id": "cargo-1.53.0-3.40.1.s390x" } }, { "category": "product_version", "name": "rust-1.53.0-3.40.1.s390x", "product": { "name": "rust-1.53.0-3.40.1.s390x", "product_id": "rust-1.53.0-3.40.1.s390x" } }, { "category": "product_version", "name": "rust-gdb-1.53.0-3.40.1.s390x", "product": { "name": "rust-gdb-1.53.0-3.40.1.s390x", "product_id": "rust-gdb-1.53.0-3.40.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "cargo-1.53.0-3.40.1.x86_64", "product": { "name": "cargo-1.53.0-3.40.1.x86_64", "product_id": "cargo-1.53.0-3.40.1.x86_64" } }, { "category": "product_version", "name": "rls-1.53.0-3.40.1.x86_64", "product": { "name": "rls-1.53.0-3.40.1.x86_64", "product_id": "rls-1.53.0-3.40.1.x86_64" } }, { "category": "product_version", "name": "rust-1.53.0-3.40.1.x86_64", "product": { "name": "rust-1.53.0-3.40.1.x86_64", "product_id": "rust-1.53.0-3.40.1.x86_64" } }, { "category": "product_version", "name": "rust-analysis-1.53.0-3.40.1.x86_64", "product": { "name": "rust-analysis-1.53.0-3.40.1.x86_64", "product_id": "rust-analysis-1.53.0-3.40.1.x86_64" } }, { "category": "product_version", "name": "rust-doc-1.53.0-3.40.1.x86_64", "product": { "name": "rust-doc-1.53.0-3.40.1.x86_64", "product_id": "rust-doc-1.53.0-3.40.1.x86_64" } }, { "category": "product_version", "name": "rust-gdb-1.53.0-3.40.1.x86_64", "product": { "name": "rust-gdb-1.53.0-3.40.1.x86_64", "product_id": "rust-gdb-1.53.0-3.40.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product": { "name": "SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_identification_helper": { "cpe": "cpe:/o:suse:sle_hpc-espos:15" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Performance Computing 15-LTSS", "product": { "name": "SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sle_hpc-ltss:15" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 15-LTSS", "product": { "name": "SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:15" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 15", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:15" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "cargo-1.53.0-3.40.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:cargo-1.53.0-3.40.1.aarch64" }, "product_reference": "cargo-1.53.0-3.40.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "cargo-1.53.0-3.40.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:cargo-1.53.0-3.40.1.x86_64" }, "product_reference": "cargo-1.53.0-3.40.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "rls-1.53.0-3.40.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:rls-1.53.0-3.40.1.aarch64" }, "product_reference": "rls-1.53.0-3.40.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "rls-1.53.0-3.40.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:rls-1.53.0-3.40.1.x86_64" }, "product_reference": "rls-1.53.0-3.40.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "rust-1.53.0-3.40.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:rust-1.53.0-3.40.1.aarch64" }, "product_reference": "rust-1.53.0-3.40.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "rust-1.53.0-3.40.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:rust-1.53.0-3.40.1.x86_64" }, "product_reference": "rust-1.53.0-3.40.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "rust-analysis-1.53.0-3.40.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:rust-analysis-1.53.0-3.40.1.aarch64" }, "product_reference": "rust-analysis-1.53.0-3.40.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "rust-analysis-1.53.0-3.40.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:rust-analysis-1.53.0-3.40.1.x86_64" }, "product_reference": "rust-analysis-1.53.0-3.40.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "rust-gdb-1.53.0-3.40.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:rust-gdb-1.53.0-3.40.1.aarch64" }, "product_reference": "rust-gdb-1.53.0-3.40.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "rust-gdb-1.53.0-3.40.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:rust-gdb-1.53.0-3.40.1.x86_64" }, "product_reference": "rust-gdb-1.53.0-3.40.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "rust-src-1.53.0-3.40.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:rust-src-1.53.0-3.40.1.noarch" }, "product_reference": "rust-src-1.53.0-3.40.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "cargo-1.53.0-3.40.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:cargo-1.53.0-3.40.1.aarch64" }, "product_reference": "cargo-1.53.0-3.40.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "cargo-1.53.0-3.40.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:cargo-1.53.0-3.40.1.x86_64" }, "product_reference": "cargo-1.53.0-3.40.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "rls-1.53.0-3.40.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:rls-1.53.0-3.40.1.aarch64" }, "product_reference": "rls-1.53.0-3.40.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "rls-1.53.0-3.40.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:rls-1.53.0-3.40.1.x86_64" }, "product_reference": "rls-1.53.0-3.40.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "rust-1.53.0-3.40.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:rust-1.53.0-3.40.1.aarch64" }, "product_reference": "rust-1.53.0-3.40.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "rust-1.53.0-3.40.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:rust-1.53.0-3.40.1.x86_64" }, "product_reference": "rust-1.53.0-3.40.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "rust-analysis-1.53.0-3.40.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:rust-analysis-1.53.0-3.40.1.aarch64" }, "product_reference": "rust-analysis-1.53.0-3.40.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "rust-analysis-1.53.0-3.40.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:rust-analysis-1.53.0-3.40.1.x86_64" }, "product_reference": "rust-analysis-1.53.0-3.40.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "rust-gdb-1.53.0-3.40.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:rust-gdb-1.53.0-3.40.1.aarch64" }, "product_reference": "rust-gdb-1.53.0-3.40.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "rust-gdb-1.53.0-3.40.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:rust-gdb-1.53.0-3.40.1.x86_64" }, "product_reference": "rust-gdb-1.53.0-3.40.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "rust-src-1.53.0-3.40.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:rust-src-1.53.0-3.40.1.noarch" }, "product_reference": "rust-src-1.53.0-3.40.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "cargo-1.53.0-3.40.1.aarch64 as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:cargo-1.53.0-3.40.1.aarch64" }, "product_reference": "cargo-1.53.0-3.40.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "cargo-1.53.0-3.40.1.ppc64le as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:cargo-1.53.0-3.40.1.ppc64le" }, "product_reference": "cargo-1.53.0-3.40.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "cargo-1.53.0-3.40.1.s390x as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:cargo-1.53.0-3.40.1.s390x" }, "product_reference": "cargo-1.53.0-3.40.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "cargo-1.53.0-3.40.1.x86_64 as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:cargo-1.53.0-3.40.1.x86_64" }, "product_reference": "cargo-1.53.0-3.40.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "rls-1.53.0-3.40.1.aarch64 as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:rls-1.53.0-3.40.1.aarch64" }, "product_reference": "rls-1.53.0-3.40.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "rls-1.53.0-3.40.1.x86_64 as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:rls-1.53.0-3.40.1.x86_64" }, "product_reference": "rls-1.53.0-3.40.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "rust-1.53.0-3.40.1.aarch64 as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:rust-1.53.0-3.40.1.aarch64" }, "product_reference": "rust-1.53.0-3.40.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "rust-1.53.0-3.40.1.ppc64le as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:rust-1.53.0-3.40.1.ppc64le" }, "product_reference": "rust-1.53.0-3.40.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "rust-1.53.0-3.40.1.s390x as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:rust-1.53.0-3.40.1.s390x" }, "product_reference": "rust-1.53.0-3.40.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "rust-1.53.0-3.40.1.x86_64 as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:rust-1.53.0-3.40.1.x86_64" }, "product_reference": "rust-1.53.0-3.40.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "rust-analysis-1.53.0-3.40.1.aarch64 as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:rust-analysis-1.53.0-3.40.1.aarch64" }, "product_reference": "rust-analysis-1.53.0-3.40.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "rust-analysis-1.53.0-3.40.1.x86_64 as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:rust-analysis-1.53.0-3.40.1.x86_64" }, "product_reference": "rust-analysis-1.53.0-3.40.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "rust-gdb-1.53.0-3.40.1.aarch64 as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:rust-gdb-1.53.0-3.40.1.aarch64" }, "product_reference": "rust-gdb-1.53.0-3.40.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "rust-gdb-1.53.0-3.40.1.ppc64le as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:rust-gdb-1.53.0-3.40.1.ppc64le" }, "product_reference": "rust-gdb-1.53.0-3.40.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "rust-gdb-1.53.0-3.40.1.s390x as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:rust-gdb-1.53.0-3.40.1.s390x" }, "product_reference": "rust-gdb-1.53.0-3.40.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "rust-gdb-1.53.0-3.40.1.x86_64 as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:rust-gdb-1.53.0-3.40.1.x86_64" }, "product_reference": "rust-gdb-1.53.0-3.40.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "rust-src-1.53.0-3.40.1.noarch as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:rust-src-1.53.0-3.40.1.noarch" }, "product_reference": "rust-src-1.53.0-3.40.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "cargo-1.53.0-3.40.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:cargo-1.53.0-3.40.1.ppc64le" }, "product_reference": "cargo-1.53.0-3.40.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "cargo-1.53.0-3.40.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:cargo-1.53.0-3.40.1.x86_64" }, "product_reference": "cargo-1.53.0-3.40.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "rls-1.53.0-3.40.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:rls-1.53.0-3.40.1.x86_64" }, "product_reference": "rls-1.53.0-3.40.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "rust-1.53.0-3.40.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:rust-1.53.0-3.40.1.ppc64le" }, "product_reference": "rust-1.53.0-3.40.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "rust-1.53.0-3.40.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:rust-1.53.0-3.40.1.x86_64" }, "product_reference": "rust-1.53.0-3.40.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "rust-analysis-1.53.0-3.40.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:rust-analysis-1.53.0-3.40.1.x86_64" }, "product_reference": "rust-analysis-1.53.0-3.40.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "rust-gdb-1.53.0-3.40.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:rust-gdb-1.53.0-3.40.1.ppc64le" }, "product_reference": "rust-gdb-1.53.0-3.40.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "rust-gdb-1.53.0-3.40.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:rust-gdb-1.53.0-3.40.1.x86_64" }, "product_reference": "rust-gdb-1.53.0-3.40.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "rust-src-1.53.0-3.40.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:rust-src-1.53.0-3.40.1.noarch" }, "product_reference": "rust-src-1.53.0-3.40.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-21658", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-21658" } ], "notes": [ { "category": "general", "text": "Rust is a multi-paradigm, general-purpose programming language designed for performance and safety, especially safe concurrency. The Rust Security Response WG was notified that the `std::fs::remove_dir_all` standard library function is vulnerable a race condition enabling symlink following (CWE-363). An attacker could use this security issue to trick a privileged program into deleting files and directories the attacker couldn\u0027t otherwise access or delete. Rust 1.0.0 through Rust 1.58.0 is affected by this vulnerability with 1.58.1 containing a patch. Note that the following build targets don\u0027t have usable APIs to properly mitigate the attack, and are thus still vulnerable even with a patched toolchain: macOS before version 10.10 (Yosemite) and REDOX. We recommend everyone to update to Rust 1.58.1 as soon as possible, especially people developing programs expected to run in privileged contexts (including system daemons and setuid binaries), as those have the highest risk of being affected by this. Note that adding checks in your codebase before calling remove_dir_all will not mitigate the vulnerability, as they would also be vulnerable to race conditions like remove_dir_all itself. The existing mitigation is working as intended outside of race conditions.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Performance Computing 15-ESPOS:cargo-1.53.0-3.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:cargo-1.53.0-3.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:rls-1.53.0-3.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:rls-1.53.0-3.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:rust-1.53.0-3.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:rust-1.53.0-3.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:rust-analysis-1.53.0-3.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:rust-analysis-1.53.0-3.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:rust-gdb-1.53.0-3.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:rust-gdb-1.53.0-3.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:rust-src-1.53.0-3.40.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:cargo-1.53.0-3.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:cargo-1.53.0-3.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:rls-1.53.0-3.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:rls-1.53.0-3.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:rust-1.53.0-3.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:rust-1.53.0-3.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:rust-analysis-1.53.0-3.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:rust-analysis-1.53.0-3.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:rust-gdb-1.53.0-3.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:rust-gdb-1.53.0-3.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:rust-src-1.53.0-3.40.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:cargo-1.53.0-3.40.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:cargo-1.53.0-3.40.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:cargo-1.53.0-3.40.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:cargo-1.53.0-3.40.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:rls-1.53.0-3.40.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:rls-1.53.0-3.40.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:rust-1.53.0-3.40.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:rust-1.53.0-3.40.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:rust-1.53.0-3.40.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:rust-1.53.0-3.40.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:rust-analysis-1.53.0-3.40.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:rust-analysis-1.53.0-3.40.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:rust-gdb-1.53.0-3.40.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:rust-gdb-1.53.0-3.40.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:rust-gdb-1.53.0-3.40.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:rust-gdb-1.53.0-3.40.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:rust-src-1.53.0-3.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:cargo-1.53.0-3.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:cargo-1.53.0-3.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:rls-1.53.0-3.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:rust-1.53.0-3.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:rust-1.53.0-3.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:rust-analysis-1.53.0-3.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:rust-gdb-1.53.0-3.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:rust-gdb-1.53.0-3.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:rust-src-1.53.0-3.40.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2022-21658", "url": "https://www.suse.com/security/cve/CVE-2022-21658" }, { "category": "external", "summary": "SUSE Bug 1194767 for CVE-2022-21658", "url": "https://bugzilla.suse.com/1194767" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Performance Computing 15-ESPOS:cargo-1.53.0-3.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:cargo-1.53.0-3.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:rls-1.53.0-3.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:rls-1.53.0-3.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:rust-1.53.0-3.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:rust-1.53.0-3.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:rust-analysis-1.53.0-3.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:rust-analysis-1.53.0-3.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:rust-gdb-1.53.0-3.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:rust-gdb-1.53.0-3.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:rust-src-1.53.0-3.40.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:cargo-1.53.0-3.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:cargo-1.53.0-3.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:rls-1.53.0-3.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:rls-1.53.0-3.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:rust-1.53.0-3.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:rust-1.53.0-3.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:rust-analysis-1.53.0-3.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:rust-analysis-1.53.0-3.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:rust-gdb-1.53.0-3.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:rust-gdb-1.53.0-3.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:rust-src-1.53.0-3.40.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:cargo-1.53.0-3.40.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:cargo-1.53.0-3.40.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:cargo-1.53.0-3.40.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:cargo-1.53.0-3.40.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:rls-1.53.0-3.40.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:rls-1.53.0-3.40.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:rust-1.53.0-3.40.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:rust-1.53.0-3.40.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:rust-1.53.0-3.40.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:rust-1.53.0-3.40.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:rust-analysis-1.53.0-3.40.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:rust-analysis-1.53.0-3.40.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:rust-gdb-1.53.0-3.40.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:rust-gdb-1.53.0-3.40.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:rust-gdb-1.53.0-3.40.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:rust-gdb-1.53.0-3.40.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:rust-src-1.53.0-3.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:cargo-1.53.0-3.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:cargo-1.53.0-3.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:rls-1.53.0-3.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:rust-1.53.0-3.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:rust-1.53.0-3.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:rust-analysis-1.53.0-3.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:rust-gdb-1.53.0-3.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:rust-gdb-1.53.0-3.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:rust-src-1.53.0-3.40.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Performance Computing 15-ESPOS:cargo-1.53.0-3.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:cargo-1.53.0-3.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:rls-1.53.0-3.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:rls-1.53.0-3.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:rust-1.53.0-3.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:rust-1.53.0-3.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:rust-analysis-1.53.0-3.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:rust-analysis-1.53.0-3.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:rust-gdb-1.53.0-3.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:rust-gdb-1.53.0-3.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:rust-src-1.53.0-3.40.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:cargo-1.53.0-3.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:cargo-1.53.0-3.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:rls-1.53.0-3.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:rls-1.53.0-3.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:rust-1.53.0-3.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:rust-1.53.0-3.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:rust-analysis-1.53.0-3.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:rust-analysis-1.53.0-3.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:rust-gdb-1.53.0-3.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:rust-gdb-1.53.0-3.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:rust-src-1.53.0-3.40.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:cargo-1.53.0-3.40.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:cargo-1.53.0-3.40.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:cargo-1.53.0-3.40.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:cargo-1.53.0-3.40.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:rls-1.53.0-3.40.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:rls-1.53.0-3.40.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:rust-1.53.0-3.40.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:rust-1.53.0-3.40.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:rust-1.53.0-3.40.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:rust-1.53.0-3.40.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:rust-analysis-1.53.0-3.40.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:rust-analysis-1.53.0-3.40.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:rust-gdb-1.53.0-3.40.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:rust-gdb-1.53.0-3.40.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:rust-gdb-1.53.0-3.40.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:rust-gdb-1.53.0-3.40.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:rust-src-1.53.0-3.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:cargo-1.53.0-3.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:cargo-1.53.0-3.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:rls-1.53.0-3.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:rust-1.53.0-3.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:rust-1.53.0-3.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:rust-analysis-1.53.0-3.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:rust-gdb-1.53.0-3.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:rust-gdb-1.53.0-3.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:rust-src-1.53.0-3.40.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2022-01-26T10:34:40Z", "details": "moderate" } ], "title": "CVE-2022-21658" } ] }
ncsc-2025-0106
Vulnerability from csaf_ncscnl
Published
2025-04-08 13:57
Modified
2025-04-08 13:57
Summary
Kwetsbaarheden verholpen in Siemens producten
Notes
The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:
NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.
NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.
This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings.
Feiten
Siemens heeft kwetsbaarheden verholpen in diverse producten als Industrial Edge Devices, Mendix, SENTRON, SIDIS, SIMATIC, SIPLUS,Insights Hub Private Cloud, Siemens License Server en Solid Edge.
Interpretaties
De kwetsbaarheden stellen een kwaadwillende mogelijk in staat aanvallen uit te voeren die kunnen leiden tot de volgende categorieën schade:
- Denial-of-Service (DoS)
- Manipulatie van gegevens
- Omzeilen van een beveiligingsmaatregel
- Omzeilen van authenticatie
- (Remote) code execution (root/admin rechten)
- (Remote) code execution (Gebruikersrechten)
- Toegang tot systeemgegevens
- Toegang tot gevoelige gegevens
- Spoofing
De kwaadwillende heeft hiervoor toegang nodig tot de productieomgeving. Het is goed gebruik een dergelijke omgeving niet publiek toegankelijk te hebben.
Oplossingen
Siemens heeft beveiligingsupdates uitgebracht om de kwetsbaarheden te verhelpen. Voor de kwetsbaarheden waar nog geen updates voor zijn, heeft Siemens mitigerende maatregelen gepubliceerd om de risico's zoveel als mogelijk te beperken. Zie de bijgevoegde referenties voor meer informatie.
Dreigingsinformatie
Kans
medium
Schade
high
CWE-287
Improper Authentication
CWE-1240
Use of a Cryptographic Primitive with a Risky Implementation
CWE-606
Unchecked Input for Loop Condition
CWE-1395
Dependency on Vulnerable Third-Party Component
CWE-363
Race Condition Enabling Link Following
CWE-420
Unprotected Alternate Channel
CWE-684
Incorrect Provision of Specified Functionality
CWE-834
Excessive Iteration
CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CWE-440
Expected Behavior Violation
CWE-754
Improper Check for Unusual or Exceptional Conditions
CWE-319
Cleartext Transmission of Sensitive Information
CWE-354
Improper Validation of Integrity Check Value
CWE-325
Missing Cryptographic Step
CWE-404
Improper Resource Shutdown or Release
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE-1333
Inefficient Regular Expression Complexity
CWE-416
Use After Free
CWE-476
NULL Pointer Dereference
CWE-327
Use of a Broken or Risky Cryptographic Algorithm
CWE-400
Uncontrolled Resource Consumption
CWE-787
Out-of-bounds Write
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CWE-122
Heap-based Buffer Overflow
CWE-20
Improper Input Validation
CWE-1390
Weak Authentication
CWE-204
Observable Response Discrepancy
CWE-15
External Control of System or Configuration Setting
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CWE-653
Improper Isolation or Compartmentalization
CWE-94
Improper Control of Generation of Code ('Code Injection')
CWE-620
Unverified Password Change
CWE-798
Use of Hard-coded Credentials
CWE-269
Improper Privilege Management
CWE-295
Improper Certificate Validation
{ "document": { "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE" } }, "lang": "nl", "notes": [ { "category": "legal_disclaimer", "text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings." }, { "category": "description", "text": "Siemens heeft kwetsbaarheden verholpen in diverse producten als Industrial Edge Devices, Mendix, SENTRON, SIDIS, SIMATIC, SIPLUS,Insights Hub Private Cloud, Siemens License Server en Solid Edge.", "title": "Feiten" }, { "category": "description", "text": "De kwetsbaarheden stellen een kwaadwillende mogelijk in staat aanvallen uit te voeren die kunnen leiden tot de volgende categorie\u00ebn schade:\n\n- Denial-of-Service (DoS)\n- Manipulatie van gegevens\n- Omzeilen van een beveiligingsmaatregel\n- Omzeilen van authenticatie\n- (Remote) code execution (root/admin rechten)\n- (Remote) code execution (Gebruikersrechten)\n- Toegang tot systeemgegevens\n- Toegang tot gevoelige gegevens\n- Spoofing\n\nDe kwaadwillende heeft hiervoor toegang nodig tot de productieomgeving. Het is goed gebruik een dergelijke omgeving niet publiek toegankelijk te hebben.", "title": "Interpretaties" }, { "category": "description", "text": "Siemens heeft beveiligingsupdates uitgebracht om de kwetsbaarheden te verhelpen. Voor de kwetsbaarheden waar nog geen updates voor zijn, heeft Siemens mitigerende maatregelen gepubliceerd om de risico\u0027s zoveel als mogelijk te beperken. Zie de bijgevoegde referenties voor meer informatie.", "title": "Oplossingen" }, { "category": "description", "text": " ", "title": "Dreigingsinformatie" }, { "category": "general", "text": "medium", "title": "Kans" }, { "category": "general", "text": "high", "title": "Schade" }, { "category": "general", "text": "Improper Authentication", "title": "CWE-287" }, { "category": "general", "text": "Use of a Cryptographic Primitive with a Risky Implementation", "title": "CWE-1240" }, { "category": "general", "text": "Unchecked Input for Loop Condition", "title": "CWE-606" }, { "category": "general", "text": "Dependency on Vulnerable Third-Party Component", "title": "CWE-1395" }, { "category": "general", "text": "Race Condition Enabling Link Following", "title": "CWE-363" }, { "category": "general", "text": "Unprotected Alternate Channel", "title": "CWE-420" }, { "category": "general", "text": "Incorrect Provision of Specified Functionality", "title": "CWE-684" }, { "category": "general", "text": "Excessive Iteration", "title": "CWE-834" }, { "category": "general", "text": "Time-of-check Time-of-use (TOCTOU) Race Condition", "title": "CWE-367" }, { "category": "general", "text": "Expected Behavior Violation", "title": "CWE-440" }, { "category": "general", "text": "Improper Check for Unusual or Exceptional Conditions", "title": "CWE-754" }, { "category": "general", "text": "Cleartext Transmission of Sensitive Information", "title": "CWE-319" }, { "category": "general", "text": "Improper Validation of Integrity Check Value", "title": "CWE-354" }, { "category": "general", "text": "Missing Cryptographic Step", "title": "CWE-325" }, { "category": "general", "text": "Improper Resource Shutdown or Release", "title": "CWE-404" }, { "category": "general", "text": "Improper Restriction of Operations within the Bounds of a Memory Buffer", "title": "CWE-119" }, { "category": "general", "text": "Inefficient Regular Expression Complexity", "title": "CWE-1333" }, { "category": "general", "text": "Use After Free", "title": "CWE-416" }, { "category": "general", "text": "NULL Pointer Dereference", "title": "CWE-476" }, { "category": "general", "text": "Use of a Broken or Risky Cryptographic Algorithm", "title": "CWE-327" }, { "category": "general", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" }, { "category": "general", "text": "Out-of-bounds Write", "title": "CWE-787" }, { "category": "general", "text": "Exposure of Sensitive Information to an Unauthorized Actor", "title": "CWE-200" }, { "category": "general", "text": "Heap-based Buffer Overflow", "title": "CWE-122" }, { "category": "general", "text": "Improper Input Validation", "title": "CWE-20" }, { "category": "general", "text": "Weak Authentication", "title": "CWE-1390" }, { "category": "general", "text": "Observable Response Discrepancy", "title": "CWE-204" }, { "category": "general", "text": "External Control of System or Configuration Setting", "title": "CWE-15" }, { "category": "general", "text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)", "title": "CWE-22" }, { "category": "general", "text": "Improper Isolation or Compartmentalization", "title": "CWE-653" }, { "category": "general", "text": "Improper Control of Generation of Code (\u0027Code Injection\u0027)", "title": "CWE-94" }, { "category": "general", "text": "Unverified Password Change", "title": "CWE-620" }, { "category": "general", "text": "Use of Hard-coded Credentials", "title": "CWE-798" }, { "category": "general", "text": "Improper Privilege Management", "title": "CWE-269" }, { "category": "general", "text": "Improper Certificate Validation", "title": "CWE-295" } ], "publisher": { "category": "coordinator", "contact_details": "cert@ncsc.nl", "name": "Nationaal Cyber Security Centrum", "namespace": "https://www.ncsc.nl/" }, "references": [ { "category": "external", "summary": "Reference - ncscclear", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-187636.pdf" }, { "category": "external", "summary": "Reference - ncscclear", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-277137.pdf" }, { "category": "external", "summary": "Reference - ncscclear", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-525431.pdf" }, { "category": "external", "summary": "Reference - ncscclear", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-634640.pdf" }, { "category": "external", "summary": "Reference - ncscclear", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-672923.pdf" }, { "category": "external", "summary": "Reference - ncscclear", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-725549.pdf" }, { "category": "external", "summary": "Reference - ncscclear", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-819629.pdf" }, { "category": "external", "summary": "Reference - ncscclear", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-874353.pdf" }, { "category": "external", "summary": "Reference - ncscclear", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-817234.pdf" } ], "title": "Kwetsbaarheden verholpen in Siemens producten", "tracking": { "current_release_date": "2025-04-08T13:57:11.959816Z", "generator": { "date": "2025-02-25T15:15:00Z", "engine": { "name": "V.A.", "version": "1.0" } }, "id": "NCSC-2025-0106", "initial_release_date": "2025-04-08T13:57:11.959816Z", "revision_history": [ { "date": "2025-04-08T13:57:11.959816Z", "number": "1.0.0", "summary": "Initiele versie" } ], "status": "final", "version": "1.0.0" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "vers:unknown/\u003cv1.21.1-1-a", "product": { "name": "vers:unknown/\u003cv1.21.1-1-a", "product_id": "CSAFPID-2631845" } } ], "category": "product_name", "name": "Industrial Edge Own Device (IEOD)" }, { "branches": [ { "category": "product_version_range", "name": "vers:unknown/\u003cv1.21.1-1", "product": { "name": "vers:unknown/\u003cv1.21.1-1", "product_id": "CSAFPID-2631844" } } ], "category": "product_name", "name": "Industrial Edge Device Kit - x86-64 V1.21" }, { "branches": [ { "category": "product_version_range", "name": "vers:unknown/\u003cv1.20.2-1", "product": { "name": "vers:unknown/\u003cv1.20.2-1", "product_id": "CSAFPID-2631843" } } ], "category": "product_name", "name": "Industrial Edge Device Kit - x86-64 V1.20" }, { "branches": [ { "category": "product_version_range", "name": "vers:unknown/\u003c*", "product": { "name": "vers:unknown/\u003c*", "product_id": "CSAFPID-2631842" } } ], "category": "product_name", "name": "Industrial Edge Device Kit - x86-64 V1.19" }, { "branches": [ { "category": "product_version_range", "name": "vers:unknown/\u003c*", "product": { "name": "vers:unknown/\u003c*", "product_id": "CSAFPID-2631841" } } ], "category": "product_name", "name": "Industrial Edge Device Kit - x86-64 V1.18" }, { "branches": [ { "category": "product_version_range", "name": "vers:unknown/\u003c*", "product": { "name": "vers:unknown/\u003c*", "product_id": "CSAFPID-2631840" } } ], "category": "product_name", "name": "Industrial Edge Device Kit - x86-64 V1.17" }, { "branches": [ { "category": "product_version_range", "name": "vers:unknown/\u003cv1.21.1-1", "product": { "name": "vers:unknown/\u003cv1.21.1-1", "product_id": "CSAFPID-2631839" } } ], "category": "product_name", "name": "Industrial Edge Device Kit - arm64 V1.21" }, { "branches": [ { "category": "product_version_range", "name": "vers:unknown/\u003cv1.20.2-1", "product": { "name": "vers:unknown/\u003cv1.20.2-1", "product_id": "CSAFPID-2631838" } } ], "category": "product_name", "name": "Industrial Edge Device Kit - arm64 V1.20" }, { "branches": [ { "category": "product_version_range", "name": "vers:unknown/\u003c*", "product": { "name": "vers:unknown/\u003c*", "product_id": "CSAFPID-2631837" } } ], "category": "product_name", "name": "Industrial Edge Device Kit - arm64 V1.19" }, { "branches": [ { "category": "product_version_range", "name": "vers:unknown/\u003c*", "product": { "name": "vers:unknown/\u003c*", "product_id": "CSAFPID-2631836" } } ], "category": "product_name", "name": "Industrial Edge Device Kit - arm64 V1.18" }, { "branches": [ { "category": "product_version_range", "name": "vers:unknown/\u003c*", "product": { "name": "vers:unknown/\u003c*", "product_id": "CSAFPID-2631835" } } ], "category": "product_name", "name": "Industrial Edge Device Kit - arm64 V1.17" }, { "branches": [ { "category": "product_version_range", "name": "vers:unknown/\u003c*", "product": { "name": "vers:unknown/\u003c*", "product_id": "CSAFPID-2631900" } } ], "category": "product_name", "name": "SENTRON 7KT PAC1260 Data Manager" }, { "branches": [ { "category": "product_version_range", "name": "vers:unknown/4.0", "product": { "name": "vers:unknown/4.0", "product_id": "CSAFPID-2632341" } }, { "category": "product_version_range", "name": "vers:unknown/4.1", "product": { "name": "vers:unknown/4.1", "product_id": "CSAFPID-2632342" } }, { "category": "product_version_range", "name": "vers:unknown/4.2", "product": { "name": "vers:unknown/4.2", "product_id": "CSAFPID-2632343" } } ], "category": "product_name", "name": "License Server" }, { "branches": [ { "category": "product_version_range", "name": "vers:unknown/\u003cv4.3", "product": { "name": "vers:unknown/\u003cv4.3", "product_id": "CSAFPID-2631790" } } ], "category": "product_name", "name": "Siemens License Server (SLS)" }, { "branches": [ { "branches": [ { "category": "product_version_range", "name": "vers:siemens/224.0 update 12", "product": { "name": "vers:siemens/224.0 update 12", "product_id": "CSAFPID-2632460" } }, { "category": "product_version_range", "name": "vers:siemens/225.0 update 3", "product": { "name": "vers:siemens/225.0 update 3", "product_id": "CSAFPID-2632459" } } ], "category": "product_name", "name": "Solid Edge" }, { "branches": [ { "category": "product_version_range", "name": "vers:siemens/v224.0 update 12", "product": { "name": "vers:siemens/v224.0 update 12", "product_id": "CSAFPID-2632083" } } ], "category": "product_name", "name": "Solid_Edge_Se2024" }, { "branches": [ { "category": "product_version_range", "name": "vers:siemens/2.0 sp1", "product": { "name": "vers:siemens/2.0 sp1", "product_id": "CSAFPID-1211926" } } ], "category": "product_name", "name": "SINEC Network Management System" }, { "branches": [ { "category": "product_version_range", "name": "vers:unknown/none", "product": { "name": "vers:unknown/none", "product_id": "CSAFPID-2619361" } } ], "category": "product_name", "name": "Siemens Simatic S7-1500 Tm Mfp" }, { "branches": [ { "category": "product_version_range", "name": "vers:unknown/\u003e=3|\u003c312", "product": { "name": "vers:unknown/\u003e=3|\u003c312", "product_id": "CSAFPID-1209122" } } ], "category": "product_name", "name": "Siemens Telecontrol Server Basic" } ], "category": "product_family", "name": "Siemens" }, { "branches": [ { "category": "product_version_range", "name": "vers:unknown/\u003cv224.0update12", "product": { "name": "vers:unknown/\u003cv224.0update12", "product_id": "CSAFPID-2631854" } } ], "category": "product_name", "name": "Solid Edge SE2024" }, { "branches": [ { "category": "product_version_range", "name": "vers:unknown/\u003cv225.0update3", "product": { "name": "vers:unknown/\u003cv225.0update3", "product_id": "CSAFPID-2631855" } } ], "category": "product_name", "name": "Solid Edge SE2025" }, { "branches": [ { "category": "product_version_range", "name": "vers:unknown/\u003cv2.0.0", "product": { "name": "vers:unknown/\u003cv2.0.0", "product_id": "CSAFPID-1296722" } } ], "category": "product_name", "name": "SIMATIC CFU DIQ" }, { "branches": [ { "category": "product_version_range", "name": "vers:unknown/\u003cv2.0", "product": { "name": "vers:unknown/\u003cv2.0", "product_id": "CSAFPID-2631923" } }, { "category": "product_version_range", "name": "vers:unknown/\u003cv2.0.0", "product": { "name": "vers:unknown/\u003cv2.0.0", "product_id": "CSAFPID-1296723" } } ], "category": "product_name", "name": "SIMATIC CFU PA" }, { "branches": [ { "category": "product_version_range", "name": "vers:unknown/\u003c*", "product": { "name": "vers:unknown/\u003c*", "product_id": "CSAFPID-2631924" } } ], "category": "product_name", "name": "SIMATIC ET 200AL IM 157-1 PN" }, { "branches": [ { "category": "product_version_range", "name": "vers:unknown/\u003c*", "product": { "name": "vers:unknown/\u003c*", "product_id": "CSAFPID-2631925" } } ], "category": "product_name", "name": "SIMATIC ET 200M IM 153-4 PN IO HF" }, { "branches": [ { "category": "product_version_range", "name": "vers:unknown/\u003c*", "product": { "name": "vers:unknown/\u003c*", "product_id": "CSAFPID-2631926" } } ], "category": "product_name", "name": "SIMATIC ET 200M IM 153-4 PN IO ST" }, { "branches": [ { "category": "product_version_range", "name": "vers:unknown/\u003c*", "product": { "name": "vers:unknown/\u003c*", "product_id": "CSAFPID-2631927" } } ], "category": "product_name", "name": "SIMATIC ET 200MP IM 155-5 PN BA" }, { "branches": [ { "category": "product_version_range", "name": "vers:unknown/\u003c*", "product": { "name": "vers:unknown/\u003c*", "product_id": "CSAFPID-2631928" } } ], "category": "product_name", "name": "SIMATIC ET 200MP IM 155-5 PN HF" }, { "branches": [ { "category": "product_version_range", "name": "vers:unknown/\u003c*", "product": { "name": "vers:unknown/\u003c*", "product_id": "CSAFPID-2631929" } } ], "category": "product_name", "name": "SIMATIC ET 200MP IM 155-5 PN ST" }, { "branches": [ { "category": "product_version_range", "name": "vers:unknown/\u003c*", "product": { "name": "vers:unknown/\u003c*", "product_id": "CSAFPID-2631932" } } ], "category": "product_name", "name": "SIMATIC ET 200S IM 151-3 PN FO" }, { "branches": [ { "category": "product_version_range", "name": "vers:unknown/\u003c*", "product": { "name": "vers:unknown/\u003c*", "product_id": "CSAFPID-2631933" } } ], "category": "product_name", "name": "SIMATIC ET 200S IM 151-3 PN HF" }, { "branches": [ { "category": "product_version_range", "name": "vers:unknown/\u003c*", "product": { "name": "vers:unknown/\u003c*", "product_id": "CSAFPID-2631934" } } ], "category": "product_name", "name": "SIMATIC ET 200S IM 151-3 PN HS" }, { "branches": [ { "category": "product_version_range", "name": "vers:unknown/\u003c*", "product": { "name": "vers:unknown/\u003c*", "product_id": "CSAFPID-2631935" } } ], "category": "product_name", "name": "SIMATIC ET 200S IM 151-3 PN ST" }, { "branches": [ { "category": "product_version_range", "name": "vers:unknown/\u003c*", "product": { "name": "vers:unknown/\u003c*", "product_id": "CSAFPID-1765658" } } ], "category": "product_name", "name": "SIMATIC ET 200S IM 151-8 PN/DP CPU" }, { "branches": [ { "category": "product_version_range", "name": "vers:unknown/\u003c*", "product": { "name": "vers:unknown/\u003c*", "product_id": "CSAFPID-1765659" } } ], "category": "product_name", "name": "SIMATIC ET 200S IM 151-8F PN/DP CPU" }, { "branches": [ { "category": "product_version_range", "name": "vers:unknown/\u003c*", "product": { "name": "vers:unknown/\u003c*", "product_id": "CSAFPID-2631856" } } ], "category": "product_name", "name": "SIMATIC ET 200SP CPU 1510SP F-1 PN" }, { "branches": [ { "category": "product_version_range", "name": "vers:unknown/\u003c*", "product": { "name": "vers:unknown/\u003c*", "product_id": "CSAFPID-2631858" } } ], "category": "product_name", "name": "SIMATIC ET 200SP CPU 1510SP-1 PN" }, { "branches": [ { "category": "product_version_range", "name": "vers:unknown/\u003c*", "product": { "name": "vers:unknown/\u003c*", "product_id": "CSAFPID-2631860" } } ], "category": "product_name", "name": "SIMATIC ET 200SP CPU 1512SP F-1 PN" }, { "branches": [ { "category": "product_version_range", "name": "vers:unknown/\u003c*", "product": { "name": "vers:unknown/\u003c*", "product_id": "CSAFPID-2631862" } } ], "category": "product_name", "name": "SIMATIC ET 200SP CPU 1512SP-1 PN" }, { "branches": [ { "category": "product_version_range", "name": "vers:unknown/\u003c*", "product": { "name": "vers:unknown/\u003c*", "product_id": "CSAFPID-1765660" } } ], "category": "product_name", "name": "SIMATIC ET 200SP IM 155-6 MF HF" }, { "branches": [ { "category": "product_version_range", "name": "vers:unknown/\u003c*", "product": { "name": "vers:unknown/\u003c*", "product_id": "CSAFPID-2631936" } } ], "category": "product_name", "name": "SIMATIC ET 200SP IM 155-6 PN BA" }, { "branches": [ { "category": "product_version_range", "name": "vers:unknown/\u003cv1.3", "product": { "name": "vers:unknown/\u003cv1.3", "product_id": "CSAFPID-2631937" } } ], "category": "product_name", "name": "SIMATIC ET 200SP IM 155-6 PN HA (incl. SIPLUS variants)" }, { "branches": [ { "category": "product_version_range", "name": "vers:unknown/\u003c*", "product": { "name": "vers:unknown/\u003c*", "product_id": "CSAFPID-2631938" } } ], "category": "product_name", "name": "SIMATIC ET 200SP IM 155-6 PN HF" }, { "branches": [ { "category": "product_version_range", "name": "vers:unknown/\u003c*", "product": { "name": "vers:unknown/\u003c*", "product_id": "CSAFPID-2631939" } } ], "category": "product_name", "name": "SIMATIC ET 200SP IM 155-6 PN HS" }, { "branches": [ { "category": "product_version_range", "name": "vers:unknown/\u003c*", "product": { "name": "vers:unknown/\u003c*", "product_id": "CSAFPID-2631940" } } ], "category": "product_name", "name": "SIMATIC ET 200SP IM 155-6 PN ST" }, { "branches": [ { "category": "product_version_range", "name": "vers:unknown/\u003c*", "product": { "name": "vers:unknown/\u003c*", "product_id": "CSAFPID-2631920" } } ], "category": "product_name", "name": "SIDOOR ATD430W" }, { "branches": [ { "category": "product_version_range", "name": "vers:unknown/\u003c*", "product": { "name": "vers:unknown/\u003c*", "product_id": "CSAFPID-2631921" } } ], "category": "product_name", "name": "SIDOOR ATE530G COATED" }, { "branches": [ { "category": "product_version_range", "name": "vers:unknown/\u003c*", "product": { "name": "vers:unknown/\u003c*", "product_id": "CSAFPID-2631922" } } ], "category": "product_name", "name": "SIDOOR ATE530S COATED" }, { "branches": [ { "category": "product_version_range", "name": "vers:unknown/\u003c*", "product": { "name": "vers:unknown/\u003c*", "product_id": "CSAFPID-2631967" } } ], "category": "product_name", "name": "SIMOCODE pro V Ethernet/IP (incl. SIPLUS variants)" }, { "branches": [ { "category": "product_version_range", "name": "vers:unknown/\u003c*", "product": { "name": "vers:unknown/\u003c*", "product_id": "CSAFPID-2631968" } } ], "category": "product_name", "name": "SIMOCODE pro V PROFINET" }, { "branches": [ { "category": "product_version_range", "name": "vers:unknown/\u003c*", "product": { "name": "vers:unknown/\u003c*", "product_id": "CSAFPID-2631969" } } ], "category": "product_name", "name": "SINUMERIK 840D sl" }, { "branches": [ { "category": "product_version_range", "name": "vers:unknown/\u003c*", "product": { "name": "vers:unknown/\u003c*", "product_id": "CSAFPID-2632004" } } ], "category": "product_name", "name": "SIWAREX WP231" }, { "branches": [ { "category": "product_version_range", "name": "vers:unknown/\u003c*", "product": { "name": "vers:unknown/\u003c*", "product_id": "CSAFPID-2632005" } } ], "category": "product_name", "name": "SIWAREX WP241" }, { "branches": [ { "category": "product_version_range", "name": "vers:unknown/\u003c*", "product": { "name": "vers:unknown/\u003c*", "product_id": "CSAFPID-2632006" } } ], "category": "product_name", "name": "SIWAREX WP251" }, { "branches": [ { "category": "product_version_range", "name": "vers:unknown/\u003c*", "product": { "name": "vers:unknown/\u003c*", "product_id": "CSAFPID-2632007" } } ], "category": "product_name", "name": "SIWAREX WP521 ST" }, { "branches": [ { "category": "product_version_range", "name": "vers:unknown/\u003c*", "product": { "name": "vers:unknown/\u003c*", "product_id": "CSAFPID-2632008" } } ], "category": "product_name", "name": "SIWAREX WP522 ST" }, { "branches": [ { "category": "product_version_range", "name": "vers:unknown/\u003c*", "product": { "name": "vers:unknown/\u003c*", "product_id": "CSAFPID-2631966" } } ], "category": "product_name", "name": "SIMATIC S7-400 H V6 CPU family (incl. SIPLUS variants)" }, { "branches": [ { "category": "product_version_range", "name": "vers:unknown/\u003c*", "product": { "name": "vers:unknown/\u003c*", "product_id": "CSAFPID-1765690" } } ], "category": "product_name", "name": "SIMATIC S7-400 PN/DP V7 CPU family (incl. SIPLUS variants)" }, { "branches": [ { "category": "product_version_range", "name": "vers:unknown/\u003c*", "product": { "name": "vers:unknown/\u003c*", "product_id": "CSAFPID-1765691" } } ], "category": "product_name", "name": "SIMATIC S7-410 V10 CPU family (incl. SIPLUS variants)" }, { "branches": [ { "category": "product_version_range", "name": "vers:unknown/\u003cv8.3", "product": { "name": "vers:unknown/\u003cv8.3", "product_id": "CSAFPID-2459039" } } ], "category": "product_name", "name": "SIMATIC S7-410 V8 CPU family (incl. SIPLUS variants)" }, { "branches": [ { "category": "product_version_range", "name": "vers:unknown/\u003c*", "product": { "name": "vers:unknown/\u003c*", "product_id": "CSAFPID-2631970" } } ], "category": "product_name", "name": "SIPLUS ET 200M IM 153-4 PN IO HF" }, { "branches": [ { "category": "product_version_range", "name": "vers:unknown/\u003c*", "product": { "name": "vers:unknown/\u003c*", "product_id": "CSAFPID-2631971" } } ], "category": "product_name", "name": "SIPLUS ET 200M IM 153-4 PN IO ST" }, { "branches": [ { "category": "product_version_range", "name": "vers:unknown/\u003c*", "product": { "name": "vers:unknown/\u003c*", "product_id": "CSAFPID-2631972" } } ], "category": "product_name", "name": "SIPLUS ET 200MP IM 155-5 PN HF" }, { "branches": [ { "category": "product_version_range", "name": "vers:unknown/\u003c*", "product": { "name": "vers:unknown/\u003c*", "product_id": "CSAFPID-2631973" } } ], "category": "product_name", "name": "SIPLUS ET 200MP IM 155-5 PN HF T1 RAIL" }, { "branches": [ { "category": "product_version_range", "name": "vers:unknown/\u003c*", "product": { "name": "vers:unknown/\u003c*", "product_id": "CSAFPID-2631974" } } ], "category": "product_name", "name": "SIPLUS ET 200MP IM 155-5 PN ST" }, { "branches": [ { "category": "product_version_range", "name": "vers:unknown/\u003c*", "product": { "name": "vers:unknown/\u003c*", "product_id": "CSAFPID-2631975" } } ], "category": "product_name", "name": "SIPLUS ET 200MP IM 155-5 PN ST TX RAIL" }, { "branches": [ { "category": "product_version_range", "name": "vers:unknown/\u003c*", "product": { "name": "vers:unknown/\u003c*", "product_id": "CSAFPID-1765700" } } ], "category": "product_name", "name": "SIPLUS ET 200S IM 151-8 PN/DP CPU" }, { "branches": [ { "category": "product_version_range", "name": "vers:unknown/\u003c*", "product": { "name": "vers:unknown/\u003c*", "product_id": "CSAFPID-1765701" } } ], "category": "product_name", "name": "SIPLUS ET 200S IM 151-8F PN/DP CPU" }, { "branches": [ { "category": "product_version_range", "name": "vers:unknown/\u003c*", "product": { "name": "vers:unknown/\u003c*", "product_id": "CSAFPID-2631976" } } ], "category": "product_name", "name": "SIPLUS ET 200S IM151-3 PN HF" }, { "branches": [ { "category": "product_version_range", "name": "vers:unknown/\u003c*", "product": { "name": "vers:unknown/\u003c*", "product_id": "CSAFPID-2631977" } } ], "category": "product_name", "name": "SIPLUS ET 200S IM151-3 PN ST" }, { "branches": [ { "category": "product_version_range", "name": "vers:unknown/\u003c*", "product": { "name": "vers:unknown/\u003c*", "product_id": "CSAFPID-1296980" } } ], "category": "product_name", "name": "SIPLUS ET 200SP CPU 1512SP F-1 PN" }, { "branches": [ { "category": "product_version_range", "name": "vers:unknown/\u003c*", "product": { "name": "vers:unknown/\u003c*", "product_id": "CSAFPID-2631978" } } ], "category": "product_name", "name": "SIPLUS ET 200SP IM 155-6 PN HF" }, { "branches": [ { "category": "product_version_range", "name": "vers:unknown/\u003c*", "product": { "name": "vers:unknown/\u003c*", "product_id": "CSAFPID-2631979" } } ], "category": "product_name", "name": "SIPLUS ET 200SP IM 155-6 PN HF T1 RAIL" }, { "branches": [ { "category": "product_version_range", "name": "vers:unknown/\u003c*", "product": { "name": "vers:unknown/\u003c*", "product_id": "CSAFPID-2631980" } } ], "category": "product_name", "name": "SIPLUS ET 200SP IM 155-6 PN HF TX RAIL" }, { "branches": [ { "category": "product_version_range", "name": "vers:unknown/\u003c*", "product": { "name": "vers:unknown/\u003c*", "product_id": "CSAFPID-2631981" } } ], "category": "product_name", "name": "SIPLUS ET 200SP IM 155-6 PN ST" }, { "branches": [ { "category": "product_version_range", "name": "vers:unknown/\u003c*", "product": { "name": "vers:unknown/\u003c*", "product_id": "CSAFPID-2631982" } } ], "category": "product_name", "name": "SIPLUS ET 200SP IM 155-6 PN ST BA" }, { "branches": [ { "category": "product_version_range", "name": "vers:unknown/\u003c*", "product": { "name": "vers:unknown/\u003c*", "product_id": "CSAFPID-2631983" } } ], "category": "product_name", "name": "SIPLUS ET 200SP IM 155-6 PN ST BA TX RAIL" }, { "branches": [ { "category": "product_version_range", "name": "vers:unknown/\u003c*", "product": { "name": "vers:unknown/\u003c*", "product_id": "CSAFPID-2631984" } } ], "category": "product_name", "name": "SIPLUS ET 200SP IM 155-6 PN ST TX RAIL" }, { "branches": [ { "category": "product_version_range", "name": "vers:unknown/\u003c*", "product": { "name": "vers:unknown/\u003c*", "product_id": "CSAFPID-2631985" } } ], "category": "product_name", "name": "SIPLUS HCS4200 CIM4210" }, { "branches": [ { "category": "product_version_range", "name": "vers:unknown/10.16.0", "product": { "name": "vers:unknown/10.16.0", "product_id": "CSAFPID-2632402" } } ], "category": "product_name", "name": "Mendix Runtime" }, { "branches": [ { "category": "product_version_range", "name": "vers:unknown/\u003cv10.21.0", "product": { "name": "vers:unknown/\u003cv10.21.0", "product_id": "CSAFPID-2631802" } } ], "category": "product_name", "name": "Mendix Runtime V10" }, { "branches": [ { "category": "product_version_range", "name": "vers:unknown/\u003c*", "product": { "name": "vers:unknown/\u003c*", "product_id": "CSAFPID-2631803" } } ], "category": "product_name", "name": "Mendix Runtime V10.12" }, { "branches": [ { "category": "product_version_range", "name": "vers:unknown/\u003c*", "product": { "name": "vers:unknown/\u003c*", "product_id": "CSAFPID-2631804" } } ], "category": "product_name", "name": "Mendix Runtime V10.18" }, { "branches": [ { "category": "product_version_range", "name": "vers:unknown/\u003c*", "product": { "name": "vers:unknown/\u003c*", "product_id": "CSAFPID-2631805" } } ], "category": "product_name", "name": "Mendix Runtime V10.6" }, { "branches": [ { "category": "product_version_range", "name": "vers:unknown/\u003c*", "product": { "name": "vers:unknown/\u003c*", "product_id": "CSAFPID-1296837" } } ], "category": "product_name", "name": "Mendix Runtime V8" }, { "branches": [ { "category": "product_version_range", "name": "vers:unknown/\u003cv9.24.34", "product": { "name": "vers:unknown/\u003cv9.24.34", "product_id": "CSAFPID-2631806" } } ], "category": "product_name", "name": "Mendix Runtime V9" } ], "category": "vendor", "name": "Siemens" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-21658", "cwe": { "id": "CWE-367", "name": "Time-of-check Time-of-use (TOCTOU) Race Condition" }, "notes": [ { "category": "other", "text": "Time-of-check Time-of-use (TOCTOU) Race Condition", "title": "CWE-367" }, { "category": "other", "text": "Race Condition Enabling Link Following", "title": "CWE-363" }, { "category": "other", "text": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)", "title": "CWE-362" } ], "product_status": { "known_affected": [ "CSAFPID-2631845", "CSAFPID-2631844", "CSAFPID-2631843", "CSAFPID-2631842", "CSAFPID-2631841", "CSAFPID-2631840", "CSAFPID-2631839", "CSAFPID-2631838", "CSAFPID-2631837", "CSAFPID-2631836", "CSAFPID-2631835", "CSAFPID-2631900", "CSAFPID-2632341", "CSAFPID-2632342", "CSAFPID-2632343", "CSAFPID-2631790", "CSAFPID-2632460", "CSAFPID-2632459", "CSAFPID-2631854", "CSAFPID-2631855", "CSAFPID-2632083", "CSAFPID-1296722", "CSAFPID-2631923", "CSAFPID-1296723", "CSAFPID-2631924", "CSAFPID-2631925", "CSAFPID-2631926", "CSAFPID-2631927", "CSAFPID-2631928", "CSAFPID-2631929", "CSAFPID-2631932", "CSAFPID-2631933", "CSAFPID-2631934", "CSAFPID-2631935", "CSAFPID-1765658", "CSAFPID-1765659", "CSAFPID-2631856", "CSAFPID-2631858", "CSAFPID-2631860", "CSAFPID-2631862", "CSAFPID-1765660", "CSAFPID-2631936", "CSAFPID-2631937", "CSAFPID-2631938", "CSAFPID-2631939", "CSAFPID-2631940", "CSAFPID-2631920", "CSAFPID-2631921", "CSAFPID-2631922", "CSAFPID-2631967", "CSAFPID-2631968", "CSAFPID-2631969", "CSAFPID-2632004", "CSAFPID-2632005", "CSAFPID-2632006", "CSAFPID-2632007", "CSAFPID-2632008", "CSAFPID-2631966", "CSAFPID-1765690", "CSAFPID-1765691", "CSAFPID-2459039", "CSAFPID-2631970", "CSAFPID-2631971", "CSAFPID-2631972", "CSAFPID-2631973", "CSAFPID-2631974", "CSAFPID-2631975", "CSAFPID-1765700", "CSAFPID-1765701", "CSAFPID-2631976", "CSAFPID-2631977", "CSAFPID-1296980", "CSAFPID-2631978", "CSAFPID-2631979", "CSAFPID-2631980", "CSAFPID-2631981", "CSAFPID-2631982", "CSAFPID-2631983", "CSAFPID-2631984", "CSAFPID-2631985", "CSAFPID-2632402", "CSAFPID-2631802", "CSAFPID-2631803", "CSAFPID-2631804", "CSAFPID-2631805", "CSAFPID-1296837", "CSAFPID-2631806", "CSAFPID-1211926", "CSAFPID-2619361", "CSAFPID-1209122" ] }, "references": [ { "category": "self", "summary": "CVE-2022-21658", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-21658.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:H", "version": "3.1" }, "products": [ "CSAFPID-2631845", "CSAFPID-2631844", "CSAFPID-2631843", "CSAFPID-2631842", "CSAFPID-2631841", "CSAFPID-2631840", "CSAFPID-2631839", "CSAFPID-2631838", "CSAFPID-2631837", "CSAFPID-2631836", "CSAFPID-2631835", "CSAFPID-2631900", "CSAFPID-2632341", "CSAFPID-2632342", "CSAFPID-2632343", "CSAFPID-2631790", "CSAFPID-2632460", "CSAFPID-2632459", "CSAFPID-2631854", "CSAFPID-2631855", "CSAFPID-2632083", "CSAFPID-1296722", "CSAFPID-2631923", "CSAFPID-1296723", "CSAFPID-2631924", "CSAFPID-2631925", "CSAFPID-2631926", "CSAFPID-2631927", "CSAFPID-2631928", "CSAFPID-2631929", "CSAFPID-2631932", "CSAFPID-2631933", "CSAFPID-2631934", "CSAFPID-2631935", "CSAFPID-1765658", "CSAFPID-1765659", "CSAFPID-2631856", "CSAFPID-2631858", "CSAFPID-2631860", "CSAFPID-2631862", "CSAFPID-1765660", "CSAFPID-2631936", "CSAFPID-2631937", "CSAFPID-2631938", "CSAFPID-2631939", "CSAFPID-2631940", "CSAFPID-2631920", "CSAFPID-2631921", "CSAFPID-2631922", "CSAFPID-2631967", "CSAFPID-2631968", "CSAFPID-2631969", "CSAFPID-2632004", "CSAFPID-2632005", "CSAFPID-2632006", "CSAFPID-2632007", "CSAFPID-2632008", "CSAFPID-2631966", "CSAFPID-1765690", "CSAFPID-1765691", "CSAFPID-2459039", "CSAFPID-2631970", "CSAFPID-2631971", "CSAFPID-2631972", "CSAFPID-2631973", "CSAFPID-2631974", "CSAFPID-2631975", "CSAFPID-1765700", "CSAFPID-1765701", "CSAFPID-2631976", "CSAFPID-2631977", "CSAFPID-1296980", "CSAFPID-2631978", "CSAFPID-2631979", "CSAFPID-2631980", "CSAFPID-2631981", "CSAFPID-2631982", "CSAFPID-2631983", "CSAFPID-2631984", "CSAFPID-2631985", "CSAFPID-2632402", "CSAFPID-2631802", "CSAFPID-2631803", "CSAFPID-2631804", "CSAFPID-2631805", "CSAFPID-1296837", "CSAFPID-2631806", "CSAFPID-1211926", "CSAFPID-2619361", "CSAFPID-1209122" ] } ], "title": "CVE-2022-21658" }, { "cve": "CVE-2023-2975", "cwe": { "id": "CWE-287", "name": "Improper Authentication" }, "notes": [ { "category": "other", "text": "Improper Authentication", "title": "CWE-287" }, { "category": "other", "text": "Improper Validation of Integrity Check Value", "title": "CWE-354" }, { "category": "other", "text": "Use of a Broken or Risky Cryptographic Algorithm", "title": "CWE-327" } ], "product_status": { "known_affected": [ "CSAFPID-2631845", "CSAFPID-2631844", "CSAFPID-2631843", "CSAFPID-2631842", "CSAFPID-2631841", "CSAFPID-2631840", "CSAFPID-2631839", "CSAFPID-2631838", "CSAFPID-2631837", "CSAFPID-2631836", "CSAFPID-2631835", "CSAFPID-2631900", "CSAFPID-2632341", "CSAFPID-2632342", "CSAFPID-2632343", "CSAFPID-2631790", "CSAFPID-2632460", "CSAFPID-2632459", "CSAFPID-2631854", "CSAFPID-2631855", "CSAFPID-2632083", "CSAFPID-1296722", "CSAFPID-2631923", "CSAFPID-1296723", "CSAFPID-2631924", "CSAFPID-2631925", "CSAFPID-2631926", "CSAFPID-2631927", "CSAFPID-2631928", "CSAFPID-2631929", "CSAFPID-2631932", "CSAFPID-2631933", "CSAFPID-2631934", "CSAFPID-2631935", "CSAFPID-1765658", "CSAFPID-1765659", "CSAFPID-2631856", "CSAFPID-2631858", "CSAFPID-2631860", "CSAFPID-2631862", "CSAFPID-1765660", "CSAFPID-2631936", "CSAFPID-2631937", "CSAFPID-2631938", "CSAFPID-2631939", "CSAFPID-2631940", "CSAFPID-2631920", "CSAFPID-2631921", "CSAFPID-2631922", "CSAFPID-2631967", "CSAFPID-2631968", "CSAFPID-2631969", "CSAFPID-2632004", "CSAFPID-2632005", "CSAFPID-2632006", "CSAFPID-2632007", "CSAFPID-2632008", "CSAFPID-2631966", "CSAFPID-1765690", "CSAFPID-1765691", "CSAFPID-2459039", "CSAFPID-2631970", "CSAFPID-2631971", "CSAFPID-2631972", "CSAFPID-2631973", "CSAFPID-2631974", "CSAFPID-2631975", "CSAFPID-1765700", "CSAFPID-1765701", "CSAFPID-2631976", "CSAFPID-2631977", "CSAFPID-1296980", "CSAFPID-2631978", "CSAFPID-2631979", "CSAFPID-2631980", "CSAFPID-2631981", "CSAFPID-2631982", "CSAFPID-2631983", "CSAFPID-2631984", "CSAFPID-2631985", "CSAFPID-2632402", "CSAFPID-2631802", "CSAFPID-2631803", "CSAFPID-2631804", "CSAFPID-2631805", "CSAFPID-1296837", "CSAFPID-2631806", "CSAFPID-1211926", "CSAFPID-2619361", "CSAFPID-1209122" ] }, "references": [ { "category": "self", "summary": "CVE-2023-2975", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-2975.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-2631845", "CSAFPID-2631844", "CSAFPID-2631843", "CSAFPID-2631842", "CSAFPID-2631841", "CSAFPID-2631840", "CSAFPID-2631839", "CSAFPID-2631838", "CSAFPID-2631837", "CSAFPID-2631836", "CSAFPID-2631835", "CSAFPID-2631900", "CSAFPID-2632341", "CSAFPID-2632342", "CSAFPID-2632343", "CSAFPID-2631790", "CSAFPID-2632460", "CSAFPID-2632459", "CSAFPID-2631854", "CSAFPID-2631855", "CSAFPID-2632083", "CSAFPID-1296722", "CSAFPID-2631923", "CSAFPID-1296723", "CSAFPID-2631924", "CSAFPID-2631925", "CSAFPID-2631926", "CSAFPID-2631927", "CSAFPID-2631928", "CSAFPID-2631929", "CSAFPID-2631932", "CSAFPID-2631933", "CSAFPID-2631934", "CSAFPID-2631935", "CSAFPID-1765658", "CSAFPID-1765659", "CSAFPID-2631856", "CSAFPID-2631858", "CSAFPID-2631860", "CSAFPID-2631862", "CSAFPID-1765660", "CSAFPID-2631936", "CSAFPID-2631937", "CSAFPID-2631938", "CSAFPID-2631939", "CSAFPID-2631940", "CSAFPID-2631920", "CSAFPID-2631921", "CSAFPID-2631922", "CSAFPID-2631967", "CSAFPID-2631968", "CSAFPID-2631969", "CSAFPID-2632004", "CSAFPID-2632005", "CSAFPID-2632006", "CSAFPID-2632007", "CSAFPID-2632008", "CSAFPID-2631966", "CSAFPID-1765690", "CSAFPID-1765691", "CSAFPID-2459039", "CSAFPID-2631970", "CSAFPID-2631971", "CSAFPID-2631972", "CSAFPID-2631973", "CSAFPID-2631974", "CSAFPID-2631975", "CSAFPID-1765700", "CSAFPID-1765701", "CSAFPID-2631976", "CSAFPID-2631977", "CSAFPID-1296980", "CSAFPID-2631978", "CSAFPID-2631979", "CSAFPID-2631980", "CSAFPID-2631981", "CSAFPID-2631982", "CSAFPID-2631983", "CSAFPID-2631984", "CSAFPID-2631985", "CSAFPID-2632402", "CSAFPID-2631802", "CSAFPID-2631803", "CSAFPID-2631804", "CSAFPID-2631805", "CSAFPID-1296837", "CSAFPID-2631806", "CSAFPID-1211926", "CSAFPID-2619361", "CSAFPID-1209122" ] } ], "title": "CVE-2023-2975" }, { "cve": "CVE-2023-3446", "cwe": { "id": "CWE-404", "name": "Improper Resource Shutdown or Release" }, "notes": [ { "category": "other", "text": "Improper Resource Shutdown or Release", "title": "CWE-404" }, { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" }, { "category": "other", "text": "Inefficient Regular Expression Complexity", "title": "CWE-1333" }, { "category": "other", "text": "Unchecked Input for Loop Condition", "title": "CWE-606" }, { "category": "other", "text": "Use of a Cryptographic Primitive with a Risky Implementation", "title": "CWE-1240" } ], "product_status": { "known_affected": [ "CSAFPID-2631845", "CSAFPID-2631844", "CSAFPID-2631843", "CSAFPID-2631842", "CSAFPID-2631841", "CSAFPID-2631840", "CSAFPID-2631839", "CSAFPID-2631838", "CSAFPID-2631837", "CSAFPID-2631836", "CSAFPID-2631835", "CSAFPID-2631900", "CSAFPID-2632341", "CSAFPID-2632342", "CSAFPID-2632343", "CSAFPID-2631790", "CSAFPID-2632460", "CSAFPID-2632459", "CSAFPID-2631854", "CSAFPID-2631855", "CSAFPID-2632083", "CSAFPID-1296722", "CSAFPID-2631923", "CSAFPID-1296723", "CSAFPID-2631924", "CSAFPID-2631925", "CSAFPID-2631926", "CSAFPID-2631927", "CSAFPID-2631928", "CSAFPID-2631929", "CSAFPID-2631932", "CSAFPID-2631933", "CSAFPID-2631934", "CSAFPID-2631935", "CSAFPID-1765658", "CSAFPID-1765659", "CSAFPID-2631856", "CSAFPID-2631858", "CSAFPID-2631860", "CSAFPID-2631862", "CSAFPID-1765660", "CSAFPID-2631936", "CSAFPID-2631937", "CSAFPID-2631938", "CSAFPID-2631939", "CSAFPID-2631940", "CSAFPID-2631920", "CSAFPID-2631921", "CSAFPID-2631922", "CSAFPID-2631967", "CSAFPID-2631968", "CSAFPID-2631969", "CSAFPID-2632004", "CSAFPID-2632005", "CSAFPID-2632006", "CSAFPID-2632007", "CSAFPID-2632008", "CSAFPID-2631966", "CSAFPID-1765690", "CSAFPID-1765691", "CSAFPID-2459039", "CSAFPID-2631970", "CSAFPID-2631971", "CSAFPID-2631972", "CSAFPID-2631973", "CSAFPID-2631974", "CSAFPID-2631975", "CSAFPID-1765700", "CSAFPID-1765701", "CSAFPID-2631976", "CSAFPID-2631977", "CSAFPID-1296980", "CSAFPID-2631978", "CSAFPID-2631979", "CSAFPID-2631980", "CSAFPID-2631981", "CSAFPID-2631982", "CSAFPID-2631983", "CSAFPID-2631984", "CSAFPID-2631985", "CSAFPID-2632402", "CSAFPID-2631802", "CSAFPID-2631803", "CSAFPID-2631804", "CSAFPID-2631805", "CSAFPID-1296837", "CSAFPID-2631806", "CSAFPID-1211926", "CSAFPID-2619361", "CSAFPID-1209122" ] }, "references": [ { "category": "self", "summary": "CVE-2023-3446", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-3446.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-2631845", "CSAFPID-2631844", "CSAFPID-2631843", "CSAFPID-2631842", "CSAFPID-2631841", "CSAFPID-2631840", "CSAFPID-2631839", "CSAFPID-2631838", "CSAFPID-2631837", "CSAFPID-2631836", "CSAFPID-2631835", "CSAFPID-2631900", "CSAFPID-2632341", "CSAFPID-2632342", "CSAFPID-2632343", "CSAFPID-2631790", "CSAFPID-2632460", "CSAFPID-2632459", "CSAFPID-2631854", "CSAFPID-2631855", "CSAFPID-2632083", "CSAFPID-1296722", "CSAFPID-2631923", "CSAFPID-1296723", "CSAFPID-2631924", "CSAFPID-2631925", "CSAFPID-2631926", "CSAFPID-2631927", "CSAFPID-2631928", "CSAFPID-2631929", "CSAFPID-2631932", "CSAFPID-2631933", "CSAFPID-2631934", "CSAFPID-2631935", "CSAFPID-1765658", "CSAFPID-1765659", "CSAFPID-2631856", "CSAFPID-2631858", "CSAFPID-2631860", "CSAFPID-2631862", "CSAFPID-1765660", "CSAFPID-2631936", "CSAFPID-2631937", "CSAFPID-2631938", "CSAFPID-2631939", "CSAFPID-2631940", "CSAFPID-2631920", "CSAFPID-2631921", "CSAFPID-2631922", "CSAFPID-2631967", "CSAFPID-2631968", "CSAFPID-2631969", "CSAFPID-2632004", "CSAFPID-2632005", "CSAFPID-2632006", "CSAFPID-2632007", "CSAFPID-2632008", "CSAFPID-2631966", "CSAFPID-1765690", "CSAFPID-1765691", "CSAFPID-2459039", "CSAFPID-2631970", "CSAFPID-2631971", "CSAFPID-2631972", "CSAFPID-2631973", "CSAFPID-2631974", "CSAFPID-2631975", "CSAFPID-1765700", "CSAFPID-1765701", "CSAFPID-2631976", "CSAFPID-2631977", "CSAFPID-1296980", "CSAFPID-2631978", "CSAFPID-2631979", "CSAFPID-2631980", "CSAFPID-2631981", "CSAFPID-2631982", "CSAFPID-2631983", "CSAFPID-2631984", "CSAFPID-2631985", "CSAFPID-2632402", "CSAFPID-2631802", "CSAFPID-2631803", "CSAFPID-2631804", "CSAFPID-2631805", "CSAFPID-1296837", "CSAFPID-2631806", "CSAFPID-1211926", "CSAFPID-2619361", "CSAFPID-1209122" ] } ], "title": "CVE-2023-3446" }, { "cve": "CVE-2023-3817", "cwe": { "id": "CWE-404", "name": "Improper Resource Shutdown or Release" }, "notes": [ { "category": "other", "text": "Improper Resource Shutdown or Release", "title": "CWE-404" }, { "category": "other", "text": "Excessive Iteration", "title": "CWE-834" }, { "category": "other", "text": "Unchecked Input for Loop Condition", "title": "CWE-606" }, { "category": "other", "text": "Use of a Cryptographic Primitive with a Risky Implementation", "title": "CWE-1240" } ], "product_status": { "known_affected": [ "CSAFPID-2631845", "CSAFPID-2631844", "CSAFPID-2631843", "CSAFPID-2631842", "CSAFPID-2631841", "CSAFPID-2631840", "CSAFPID-2631839", "CSAFPID-2631838", "CSAFPID-2631837", "CSAFPID-2631836", "CSAFPID-2631835", "CSAFPID-2631900", "CSAFPID-2632341", "CSAFPID-2632342", "CSAFPID-2632343", "CSAFPID-2631790", "CSAFPID-2632460", "CSAFPID-2632459", "CSAFPID-2631854", "CSAFPID-2631855", "CSAFPID-2632083", "CSAFPID-1296722", "CSAFPID-2631923", "CSAFPID-1296723", "CSAFPID-2631924", "CSAFPID-2631925", "CSAFPID-2631926", "CSAFPID-2631927", "CSAFPID-2631928", "CSAFPID-2631929", "CSAFPID-2631932", "CSAFPID-2631933", "CSAFPID-2631934", "CSAFPID-2631935", "CSAFPID-1765658", "CSAFPID-1765659", "CSAFPID-2631856", "CSAFPID-2631858", "CSAFPID-2631860", "CSAFPID-2631862", "CSAFPID-1765660", "CSAFPID-2631936", "CSAFPID-2631937", "CSAFPID-2631938", "CSAFPID-2631939", "CSAFPID-2631940", "CSAFPID-2631920", "CSAFPID-2631921", "CSAFPID-2631922", "CSAFPID-2631967", "CSAFPID-2631968", "CSAFPID-2631969", "CSAFPID-2632004", "CSAFPID-2632005", "CSAFPID-2632006", "CSAFPID-2632007", "CSAFPID-2632008", "CSAFPID-2631966", "CSAFPID-1765690", "CSAFPID-1765691", "CSAFPID-2459039", "CSAFPID-2631970", "CSAFPID-2631971", "CSAFPID-2631972", "CSAFPID-2631973", "CSAFPID-2631974", "CSAFPID-2631975", "CSAFPID-1765700", "CSAFPID-1765701", "CSAFPID-2631976", "CSAFPID-2631977", "CSAFPID-1296980", "CSAFPID-2631978", "CSAFPID-2631979", "CSAFPID-2631980", "CSAFPID-2631981", "CSAFPID-2631982", "CSAFPID-2631983", "CSAFPID-2631984", "CSAFPID-2631985", "CSAFPID-2632402", "CSAFPID-2631802", "CSAFPID-2631803", "CSAFPID-2631804", "CSAFPID-2631805", "CSAFPID-1296837", "CSAFPID-2631806", "CSAFPID-1211926", "CSAFPID-2619361", "CSAFPID-1209122" ] }, "references": [ { "category": "self", "summary": "CVE-2023-3817", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-3817.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-2631845", "CSAFPID-2631844", "CSAFPID-2631843", "CSAFPID-2631842", "CSAFPID-2631841", "CSAFPID-2631840", "CSAFPID-2631839", "CSAFPID-2631838", "CSAFPID-2631837", "CSAFPID-2631836", "CSAFPID-2631835", "CSAFPID-2631900", "CSAFPID-2632341", "CSAFPID-2632342", "CSAFPID-2632343", "CSAFPID-2631790", "CSAFPID-2632460", "CSAFPID-2632459", "CSAFPID-2631854", "CSAFPID-2631855", "CSAFPID-2632083", "CSAFPID-1296722", "CSAFPID-2631923", "CSAFPID-1296723", "CSAFPID-2631924", "CSAFPID-2631925", "CSAFPID-2631926", "CSAFPID-2631927", "CSAFPID-2631928", "CSAFPID-2631929", "CSAFPID-2631932", "CSAFPID-2631933", "CSAFPID-2631934", "CSAFPID-2631935", "CSAFPID-1765658", "CSAFPID-1765659", "CSAFPID-2631856", "CSAFPID-2631858", "CSAFPID-2631860", "CSAFPID-2631862", "CSAFPID-1765660", "CSAFPID-2631936", "CSAFPID-2631937", "CSAFPID-2631938", "CSAFPID-2631939", "CSAFPID-2631940", "CSAFPID-2631920", "CSAFPID-2631921", "CSAFPID-2631922", "CSAFPID-2631967", "CSAFPID-2631968", "CSAFPID-2631969", "CSAFPID-2632004", "CSAFPID-2632005", "CSAFPID-2632006", "CSAFPID-2632007", "CSAFPID-2632008", "CSAFPID-2631966", "CSAFPID-1765690", "CSAFPID-1765691", "CSAFPID-2459039", "CSAFPID-2631970", "CSAFPID-2631971", "CSAFPID-2631972", "CSAFPID-2631973", "CSAFPID-2631974", "CSAFPID-2631975", "CSAFPID-1765700", "CSAFPID-1765701", "CSAFPID-2631976", "CSAFPID-2631977", "CSAFPID-1296980", "CSAFPID-2631978", "CSAFPID-2631979", "CSAFPID-2631980", "CSAFPID-2631981", "CSAFPID-2631982", "CSAFPID-2631983", "CSAFPID-2631984", "CSAFPID-2631985", "CSAFPID-2632402", "CSAFPID-2631802", "CSAFPID-2631803", "CSAFPID-2631804", "CSAFPID-2631805", "CSAFPID-1296837", "CSAFPID-2631806", "CSAFPID-1211926", "CSAFPID-2619361", "CSAFPID-1209122" ] } ], "title": "CVE-2023-3817" }, { "cve": "CVE-2023-4807", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" }, { "category": "other", "text": "Expected Behavior Violation", "title": "CWE-440" } ], "product_status": { "known_affected": [ "CSAFPID-2631845", "CSAFPID-2631844", "CSAFPID-2631843", "CSAFPID-2631842", "CSAFPID-2631841", "CSAFPID-2631840", "CSAFPID-2631839", "CSAFPID-2631838", "CSAFPID-2631837", "CSAFPID-2631836", "CSAFPID-2631835", "CSAFPID-2631900", "CSAFPID-2632341", "CSAFPID-2632342", "CSAFPID-2632343", "CSAFPID-2631790", "CSAFPID-2632460", "CSAFPID-2632459", "CSAFPID-2631854", "CSAFPID-2631855", "CSAFPID-2632083", "CSAFPID-1296722", "CSAFPID-2631923", "CSAFPID-1296723", "CSAFPID-2631924", "CSAFPID-2631925", "CSAFPID-2631926", "CSAFPID-2631927", "CSAFPID-2631928", "CSAFPID-2631929", "CSAFPID-2631932", "CSAFPID-2631933", "CSAFPID-2631934", "CSAFPID-2631935", "CSAFPID-1765658", "CSAFPID-1765659", "CSAFPID-2631856", "CSAFPID-2631858", "CSAFPID-2631860", "CSAFPID-2631862", "CSAFPID-1765660", "CSAFPID-2631936", "CSAFPID-2631937", "CSAFPID-2631938", "CSAFPID-2631939", "CSAFPID-2631940", "CSAFPID-2631920", "CSAFPID-2631921", "CSAFPID-2631922", "CSAFPID-2631967", "CSAFPID-2631968", "CSAFPID-2631969", "CSAFPID-2632004", "CSAFPID-2632005", "CSAFPID-2632006", "CSAFPID-2632007", "CSAFPID-2632008", "CSAFPID-2631966", "CSAFPID-1765690", "CSAFPID-1765691", "CSAFPID-2459039", "CSAFPID-2631970", "CSAFPID-2631971", "CSAFPID-2631972", "CSAFPID-2631973", "CSAFPID-2631974", "CSAFPID-2631975", "CSAFPID-1765700", "CSAFPID-1765701", "CSAFPID-2631976", "CSAFPID-2631977", "CSAFPID-1296980", "CSAFPID-2631978", "CSAFPID-2631979", "CSAFPID-2631980", "CSAFPID-2631981", "CSAFPID-2631982", "CSAFPID-2631983", "CSAFPID-2631984", "CSAFPID-2631985", "CSAFPID-2632402", "CSAFPID-2631802", "CSAFPID-2631803", "CSAFPID-2631804", "CSAFPID-2631805", "CSAFPID-1296837", "CSAFPID-2631806", "CSAFPID-1211926", "CSAFPID-2619361", "CSAFPID-1209122" ] }, "references": [ { "category": "self", "summary": "CVE-2023-4807", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-4807.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-2631845", "CSAFPID-2631844", "CSAFPID-2631843", "CSAFPID-2631842", "CSAFPID-2631841", "CSAFPID-2631840", "CSAFPID-2631839", "CSAFPID-2631838", "CSAFPID-2631837", "CSAFPID-2631836", "CSAFPID-2631835", "CSAFPID-2631900", "CSAFPID-2632341", "CSAFPID-2632342", "CSAFPID-2632343", "CSAFPID-2631790", "CSAFPID-2632460", "CSAFPID-2632459", "CSAFPID-2631854", "CSAFPID-2631855", "CSAFPID-2632083", "CSAFPID-1296722", "CSAFPID-2631923", "CSAFPID-1296723", "CSAFPID-2631924", "CSAFPID-2631925", "CSAFPID-2631926", "CSAFPID-2631927", "CSAFPID-2631928", "CSAFPID-2631929", "CSAFPID-2631932", "CSAFPID-2631933", "CSAFPID-2631934", "CSAFPID-2631935", "CSAFPID-1765658", "CSAFPID-1765659", "CSAFPID-2631856", "CSAFPID-2631858", "CSAFPID-2631860", "CSAFPID-2631862", "CSAFPID-1765660", "CSAFPID-2631936", "CSAFPID-2631937", "CSAFPID-2631938", "CSAFPID-2631939", "CSAFPID-2631940", "CSAFPID-2631920", "CSAFPID-2631921", "CSAFPID-2631922", "CSAFPID-2631967", "CSAFPID-2631968", "CSAFPID-2631969", "CSAFPID-2632004", "CSAFPID-2632005", "CSAFPID-2632006", "CSAFPID-2632007", "CSAFPID-2632008", "CSAFPID-2631966", "CSAFPID-1765690", "CSAFPID-1765691", "CSAFPID-2459039", "CSAFPID-2631970", "CSAFPID-2631971", "CSAFPID-2631972", "CSAFPID-2631973", "CSAFPID-2631974", "CSAFPID-2631975", "CSAFPID-1765700", "CSAFPID-1765701", "CSAFPID-2631976", "CSAFPID-2631977", "CSAFPID-1296980", "CSAFPID-2631978", "CSAFPID-2631979", "CSAFPID-2631980", "CSAFPID-2631981", "CSAFPID-2631982", "CSAFPID-2631983", "CSAFPID-2631984", "CSAFPID-2631985", "CSAFPID-2632402", "CSAFPID-2631802", "CSAFPID-2631803", "CSAFPID-2631804", "CSAFPID-2631805", "CSAFPID-1296837", "CSAFPID-2631806", "CSAFPID-1211926", "CSAFPID-2619361", "CSAFPID-1209122" ] } ], "title": "CVE-2023-4807" }, { "cve": "CVE-2023-5363", "cwe": { "id": "CWE-325", "name": "Missing Cryptographic Step" }, "notes": [ { "category": "other", "text": "Missing Cryptographic Step", "title": "CWE-325" }, { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" }, { "category": "other", "text": "Incorrect Provision of Specified Functionality", "title": "CWE-684" } ], "product_status": { "known_affected": [ "CSAFPID-2631845", "CSAFPID-2631844", "CSAFPID-2631843", "CSAFPID-2631842", "CSAFPID-2631841", "CSAFPID-2631840", "CSAFPID-2631839", "CSAFPID-2631838", "CSAFPID-2631837", "CSAFPID-2631836", "CSAFPID-2631835", "CSAFPID-2631900", "CSAFPID-2632341", "CSAFPID-2632342", "CSAFPID-2632343", "CSAFPID-2631790", "CSAFPID-2632460", "CSAFPID-2632459", "CSAFPID-2631854", "CSAFPID-2631855", "CSAFPID-2632083", "CSAFPID-1296722", "CSAFPID-2631923", "CSAFPID-1296723", "CSAFPID-2631924", "CSAFPID-2631925", "CSAFPID-2631926", "CSAFPID-2631927", "CSAFPID-2631928", "CSAFPID-2631929", "CSAFPID-2631932", "CSAFPID-2631933", "CSAFPID-2631934", "CSAFPID-2631935", "CSAFPID-1765658", "CSAFPID-1765659", "CSAFPID-2631856", "CSAFPID-2631858", "CSAFPID-2631860", "CSAFPID-2631862", "CSAFPID-1765660", "CSAFPID-2631936", "CSAFPID-2631937", "CSAFPID-2631938", "CSAFPID-2631939", "CSAFPID-2631940", "CSAFPID-2631920", "CSAFPID-2631921", "CSAFPID-2631922", "CSAFPID-2631967", "CSAFPID-2631968", "CSAFPID-2631969", "CSAFPID-2632004", "CSAFPID-2632005", "CSAFPID-2632006", "CSAFPID-2632007", "CSAFPID-2632008", "CSAFPID-2631966", "CSAFPID-1765690", "CSAFPID-1765691", "CSAFPID-2459039", "CSAFPID-2631970", "CSAFPID-2631971", "CSAFPID-2631972", "CSAFPID-2631973", "CSAFPID-2631974", "CSAFPID-2631975", "CSAFPID-1765700", "CSAFPID-1765701", "CSAFPID-2631976", "CSAFPID-2631977", "CSAFPID-1296980", "CSAFPID-2631978", "CSAFPID-2631979", "CSAFPID-2631980", "CSAFPID-2631981", "CSAFPID-2631982", "CSAFPID-2631983", "CSAFPID-2631984", "CSAFPID-2631985", "CSAFPID-2632402", "CSAFPID-2631802", "CSAFPID-2631803", "CSAFPID-2631804", "CSAFPID-2631805", "CSAFPID-1296837", "CSAFPID-2631806", "CSAFPID-1211926", "CSAFPID-2619361", "CSAFPID-1209122" ] }, "references": [ { "category": "self", "summary": "CVE-2023-5363", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-5363.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-2631845", "CSAFPID-2631844", "CSAFPID-2631843", "CSAFPID-2631842", "CSAFPID-2631841", "CSAFPID-2631840", "CSAFPID-2631839", "CSAFPID-2631838", "CSAFPID-2631837", "CSAFPID-2631836", "CSAFPID-2631835", "CSAFPID-2631900", "CSAFPID-2632341", "CSAFPID-2632342", "CSAFPID-2632343", "CSAFPID-2631790", "CSAFPID-2632460", "CSAFPID-2632459", "CSAFPID-2631854", "CSAFPID-2631855", "CSAFPID-2632083", "CSAFPID-1296722", "CSAFPID-2631923", "CSAFPID-1296723", "CSAFPID-2631924", "CSAFPID-2631925", "CSAFPID-2631926", "CSAFPID-2631927", "CSAFPID-2631928", "CSAFPID-2631929", "CSAFPID-2631932", "CSAFPID-2631933", "CSAFPID-2631934", "CSAFPID-2631935", "CSAFPID-1765658", "CSAFPID-1765659", "CSAFPID-2631856", "CSAFPID-2631858", "CSAFPID-2631860", "CSAFPID-2631862", "CSAFPID-1765660", "CSAFPID-2631936", "CSAFPID-2631937", "CSAFPID-2631938", "CSAFPID-2631939", "CSAFPID-2631940", "CSAFPID-2631920", "CSAFPID-2631921", "CSAFPID-2631922", "CSAFPID-2631967", "CSAFPID-2631968", "CSAFPID-2631969", "CSAFPID-2632004", "CSAFPID-2632005", "CSAFPID-2632006", "CSAFPID-2632007", "CSAFPID-2632008", "CSAFPID-2631966", "CSAFPID-1765690", "CSAFPID-1765691", "CSAFPID-2459039", "CSAFPID-2631970", "CSAFPID-2631971", "CSAFPID-2631972", "CSAFPID-2631973", "CSAFPID-2631974", "CSAFPID-2631975", "CSAFPID-1765700", "CSAFPID-1765701", "CSAFPID-2631976", "CSAFPID-2631977", "CSAFPID-1296980", "CSAFPID-2631978", "CSAFPID-2631979", "CSAFPID-2631980", "CSAFPID-2631981", "CSAFPID-2631982", "CSAFPID-2631983", "CSAFPID-2631984", "CSAFPID-2631985", "CSAFPID-2632402", "CSAFPID-2631802", "CSAFPID-2631803", "CSAFPID-2631804", "CSAFPID-2631805", "CSAFPID-1296837", "CSAFPID-2631806", "CSAFPID-1211926", "CSAFPID-2619361", "CSAFPID-1209122" ] } ], "title": "CVE-2023-5363" }, { "cve": "CVE-2023-5678", "cwe": { "id": "CWE-754", "name": "Improper Check for Unusual or Exceptional Conditions" }, "notes": [ { "category": "other", "text": "Improper Check for Unusual or Exceptional Conditions", "title": "CWE-754" }, { "category": "other", "text": "Missing Cryptographic Step", "title": "CWE-325" }, { "category": "other", "text": "Unchecked Input for Loop Condition", "title": "CWE-606" }, { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" } ], "product_status": { "known_affected": [ "CSAFPID-2631845", "CSAFPID-2631844", "CSAFPID-2631843", "CSAFPID-2631842", "CSAFPID-2631841", "CSAFPID-2631840", "CSAFPID-2631839", "CSAFPID-2631838", "CSAFPID-2631837", "CSAFPID-2631836", "CSAFPID-2631835", "CSAFPID-2631900", "CSAFPID-2632341", "CSAFPID-2632342", "CSAFPID-2632343", "CSAFPID-2631790", "CSAFPID-2632460", "CSAFPID-2632459", "CSAFPID-2631854", "CSAFPID-2631855", "CSAFPID-2632083", "CSAFPID-1296722", "CSAFPID-2631923", "CSAFPID-1296723", "CSAFPID-2631924", "CSAFPID-2631925", "CSAFPID-2631926", "CSAFPID-2631927", "CSAFPID-2631928", "CSAFPID-2631929", "CSAFPID-2631932", "CSAFPID-2631933", "CSAFPID-2631934", "CSAFPID-2631935", "CSAFPID-1765658", "CSAFPID-1765659", "CSAFPID-2631856", "CSAFPID-2631858", "CSAFPID-2631860", "CSAFPID-2631862", "CSAFPID-1765660", "CSAFPID-2631936", "CSAFPID-2631937", "CSAFPID-2631938", "CSAFPID-2631939", "CSAFPID-2631940", "CSAFPID-2631920", "CSAFPID-2631921", "CSAFPID-2631922", "CSAFPID-2631967", "CSAFPID-2631968", "CSAFPID-2631969", "CSAFPID-2632004", "CSAFPID-2632005", "CSAFPID-2632006", "CSAFPID-2632007", "CSAFPID-2632008", "CSAFPID-2631966", "CSAFPID-1765690", "CSAFPID-1765691", "CSAFPID-2459039", "CSAFPID-2631970", "CSAFPID-2631971", "CSAFPID-2631972", "CSAFPID-2631973", "CSAFPID-2631974", "CSAFPID-2631975", "CSAFPID-1765700", "CSAFPID-1765701", "CSAFPID-2631976", "CSAFPID-2631977", "CSAFPID-1296980", "CSAFPID-2631978", "CSAFPID-2631979", "CSAFPID-2631980", "CSAFPID-2631981", "CSAFPID-2631982", "CSAFPID-2631983", "CSAFPID-2631984", "CSAFPID-2631985", "CSAFPID-2632402", "CSAFPID-2631802", "CSAFPID-2631803", "CSAFPID-2631804", "CSAFPID-2631805", "CSAFPID-1296837", "CSAFPID-2631806", "CSAFPID-1211926", "CSAFPID-2619361", "CSAFPID-1209122" ] }, "references": [ { "category": "self", "summary": "CVE-2023-5678", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-5678.json" } ], "title": "CVE-2023-5678" }, { "cve": "CVE-2023-7104", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "notes": [ { "category": "other", "text": "Heap-based Buffer Overflow", "title": "CWE-122" } ], "product_status": { "known_affected": [ "CSAFPID-2631845", "CSAFPID-2631844", "CSAFPID-2631843", "CSAFPID-2631842", "CSAFPID-2631841", "CSAFPID-2631840", "CSAFPID-2631839", "CSAFPID-2631838", "CSAFPID-2631837", "CSAFPID-2631836", "CSAFPID-2631835", "CSAFPID-2631900", "CSAFPID-2632341", "CSAFPID-2632342", "CSAFPID-2632343", "CSAFPID-2631790", "CSAFPID-2632460", "CSAFPID-2632459", "CSAFPID-2631854", "CSAFPID-2631855", "CSAFPID-2632083", "CSAFPID-1296722", "CSAFPID-2631923", "CSAFPID-1296723", "CSAFPID-2631924", "CSAFPID-2631925", "CSAFPID-2631926", "CSAFPID-2631927", "CSAFPID-2631928", "CSAFPID-2631929", "CSAFPID-2631932", "CSAFPID-2631933", "CSAFPID-2631934", "CSAFPID-2631935", "CSAFPID-1765658", "CSAFPID-1765659", "CSAFPID-2631856", "CSAFPID-2631858", "CSAFPID-2631860", "CSAFPID-2631862", "CSAFPID-1765660", "CSAFPID-2631936", "CSAFPID-2631937", "CSAFPID-2631938", "CSAFPID-2631939", "CSAFPID-2631940", "CSAFPID-2631920", "CSAFPID-2631921", "CSAFPID-2631922", "CSAFPID-2631967", "CSAFPID-2631968", "CSAFPID-2631969", "CSAFPID-2632004", "CSAFPID-2632005", "CSAFPID-2632006", "CSAFPID-2632007", "CSAFPID-2632008", "CSAFPID-2631966", "CSAFPID-1765690", "CSAFPID-1765691", "CSAFPID-2459039", "CSAFPID-2631970", "CSAFPID-2631971", "CSAFPID-2631972", "CSAFPID-2631973", "CSAFPID-2631974", "CSAFPID-2631975", "CSAFPID-1765700", "CSAFPID-1765701", "CSAFPID-2631976", "CSAFPID-2631977", "CSAFPID-1296980", "CSAFPID-2631978", "CSAFPID-2631979", "CSAFPID-2631980", "CSAFPID-2631981", "CSAFPID-2631982", "CSAFPID-2631983", "CSAFPID-2631984", "CSAFPID-2631985", "CSAFPID-2632402", "CSAFPID-2631802", "CSAFPID-2631803", "CSAFPID-2631804", "CSAFPID-2631805", "CSAFPID-1296837", "CSAFPID-2631806", "CSAFPID-1211926", "CSAFPID-2619361", "CSAFPID-1209122" ] }, "references": [ { "category": "self", "summary": "CVE-2023-7104", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-7104.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "CSAFPID-2631845", "CSAFPID-2631844", "CSAFPID-2631843", "CSAFPID-2631842", "CSAFPID-2631841", "CSAFPID-2631840", "CSAFPID-2631839", "CSAFPID-2631838", "CSAFPID-2631837", "CSAFPID-2631836", "CSAFPID-2631835", "CSAFPID-2631900", "CSAFPID-2632341", "CSAFPID-2632342", "CSAFPID-2632343", "CSAFPID-2631790", "CSAFPID-2632460", "CSAFPID-2632459", "CSAFPID-2631854", "CSAFPID-2631855", "CSAFPID-2632083", "CSAFPID-1296722", "CSAFPID-2631923", "CSAFPID-1296723", "CSAFPID-2631924", "CSAFPID-2631925", "CSAFPID-2631926", "CSAFPID-2631927", "CSAFPID-2631928", "CSAFPID-2631929", "CSAFPID-2631932", "CSAFPID-2631933", "CSAFPID-2631934", "CSAFPID-2631935", "CSAFPID-1765658", "CSAFPID-1765659", "CSAFPID-2631856", "CSAFPID-2631858", "CSAFPID-2631860", "CSAFPID-2631862", "CSAFPID-1765660", "CSAFPID-2631936", "CSAFPID-2631937", "CSAFPID-2631938", "CSAFPID-2631939", "CSAFPID-2631940", "CSAFPID-2631920", "CSAFPID-2631921", "CSAFPID-2631922", "CSAFPID-2631967", "CSAFPID-2631968", "CSAFPID-2631969", "CSAFPID-2632004", "CSAFPID-2632005", "CSAFPID-2632006", "CSAFPID-2632007", "CSAFPID-2632008", "CSAFPID-2631966", "CSAFPID-1765690", "CSAFPID-1765691", "CSAFPID-2459039", "CSAFPID-2631970", "CSAFPID-2631971", "CSAFPID-2631972", "CSAFPID-2631973", "CSAFPID-2631974", "CSAFPID-2631975", "CSAFPID-1765700", "CSAFPID-1765701", "CSAFPID-2631976", "CSAFPID-2631977", "CSAFPID-1296980", "CSAFPID-2631978", "CSAFPID-2631979", "CSAFPID-2631980", "CSAFPID-2631981", "CSAFPID-2631982", "CSAFPID-2631983", "CSAFPID-2631984", "CSAFPID-2631985", "CSAFPID-2632402", "CSAFPID-2631802", "CSAFPID-2631803", "CSAFPID-2631804", "CSAFPID-2631805", "CSAFPID-1296837", "CSAFPID-2631806", "CSAFPID-1211926", "CSAFPID-2619361", "CSAFPID-1209122" ] } ], "title": "CVE-2023-7104" }, { "cve": "CVE-2024-0056", "cwe": { "id": "CWE-420", "name": "Unprotected Alternate Channel" }, "notes": [ { "category": "other", "text": "Unprotected Alternate Channel", "title": "CWE-420" }, { "category": "other", "text": "Cleartext Transmission of Sensitive Information", "title": "CWE-319" } ], "product_status": { "known_affected": [ "CSAFPID-2631845", "CSAFPID-2631844", "CSAFPID-2631843", "CSAFPID-2631842", "CSAFPID-2631841", "CSAFPID-2631840", "CSAFPID-2631839", "CSAFPID-2631838", "CSAFPID-2631837", "CSAFPID-2631836", "CSAFPID-2631835", "CSAFPID-2631900", "CSAFPID-2632341", "CSAFPID-2632342", "CSAFPID-2632343", "CSAFPID-2631790", "CSAFPID-2632460", "CSAFPID-2632459", "CSAFPID-2631854", "CSAFPID-2631855", "CSAFPID-2632083", "CSAFPID-1296722", "CSAFPID-2631923", "CSAFPID-1296723", "CSAFPID-2631924", "CSAFPID-2631925", "CSAFPID-2631926", "CSAFPID-2631927", "CSAFPID-2631928", "CSAFPID-2631929", "CSAFPID-2631932", "CSAFPID-2631933", "CSAFPID-2631934", "CSAFPID-2631935", "CSAFPID-1765658", "CSAFPID-1765659", "CSAFPID-2631856", "CSAFPID-2631858", "CSAFPID-2631860", "CSAFPID-2631862", "CSAFPID-1765660", "CSAFPID-2631936", "CSAFPID-2631937", "CSAFPID-2631938", "CSAFPID-2631939", "CSAFPID-2631940", "CSAFPID-2631920", "CSAFPID-2631921", "CSAFPID-2631922", "CSAFPID-2631967", "CSAFPID-2631968", "CSAFPID-2631969", "CSAFPID-2632004", "CSAFPID-2632005", "CSAFPID-2632006", "CSAFPID-2632007", "CSAFPID-2632008", "CSAFPID-2631966", "CSAFPID-1765690", "CSAFPID-1765691", "CSAFPID-2459039", "CSAFPID-2631970", "CSAFPID-2631971", "CSAFPID-2631972", "CSAFPID-2631973", "CSAFPID-2631974", "CSAFPID-2631975", "CSAFPID-1765700", "CSAFPID-1765701", "CSAFPID-2631976", "CSAFPID-2631977", "CSAFPID-1296980", "CSAFPID-2631978", "CSAFPID-2631979", "CSAFPID-2631980", "CSAFPID-2631981", "CSAFPID-2631982", "CSAFPID-2631983", "CSAFPID-2631984", "CSAFPID-2631985", "CSAFPID-2632402", "CSAFPID-2631802", "CSAFPID-2631803", "CSAFPID-2631804", "CSAFPID-2631805", "CSAFPID-1296837", "CSAFPID-2631806", "CSAFPID-1211926", "CSAFPID-2619361", "CSAFPID-1209122" ] }, "references": [ { "category": "self", "summary": "CVE-2024-0056", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-0056.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-2631845", "CSAFPID-2631844", "CSAFPID-2631843", "CSAFPID-2631842", "CSAFPID-2631841", "CSAFPID-2631840", "CSAFPID-2631839", "CSAFPID-2631838", "CSAFPID-2631837", "CSAFPID-2631836", "CSAFPID-2631835", "CSAFPID-2631900", "CSAFPID-2632341", "CSAFPID-2632342", "CSAFPID-2632343", "CSAFPID-2631790", "CSAFPID-2632460", "CSAFPID-2632459", "CSAFPID-2631854", "CSAFPID-2631855", "CSAFPID-2632083", "CSAFPID-1296722", "CSAFPID-2631923", "CSAFPID-1296723", "CSAFPID-2631924", "CSAFPID-2631925", "CSAFPID-2631926", "CSAFPID-2631927", "CSAFPID-2631928", "CSAFPID-2631929", "CSAFPID-2631932", "CSAFPID-2631933", "CSAFPID-2631934", "CSAFPID-2631935", "CSAFPID-1765658", "CSAFPID-1765659", "CSAFPID-2631856", "CSAFPID-2631858", "CSAFPID-2631860", "CSAFPID-2631862", "CSAFPID-1765660", "CSAFPID-2631936", "CSAFPID-2631937", "CSAFPID-2631938", "CSAFPID-2631939", "CSAFPID-2631940", "CSAFPID-2631920", "CSAFPID-2631921", "CSAFPID-2631922", "CSAFPID-2631967", "CSAFPID-2631968", "CSAFPID-2631969", "CSAFPID-2632004", "CSAFPID-2632005", "CSAFPID-2632006", "CSAFPID-2632007", "CSAFPID-2632008", "CSAFPID-2631966", "CSAFPID-1765690", "CSAFPID-1765691", "CSAFPID-2459039", "CSAFPID-2631970", "CSAFPID-2631971", "CSAFPID-2631972", "CSAFPID-2631973", "CSAFPID-2631974", "CSAFPID-2631975", "CSAFPID-1765700", "CSAFPID-1765701", "CSAFPID-2631976", "CSAFPID-2631977", "CSAFPID-1296980", "CSAFPID-2631978", "CSAFPID-2631979", "CSAFPID-2631980", "CSAFPID-2631981", "CSAFPID-2631982", "CSAFPID-2631983", "CSAFPID-2631984", "CSAFPID-2631985", "CSAFPID-2632402", "CSAFPID-2631802", "CSAFPID-2631803", "CSAFPID-2631804", "CSAFPID-2631805", "CSAFPID-1296837", "CSAFPID-2631806", "CSAFPID-1211926", "CSAFPID-2619361", "CSAFPID-1209122" ] } ], "title": "CVE-2024-0056" }, { "cve": "CVE-2024-0232", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "other", "text": "Use After Free", "title": "CWE-416" } ], "product_status": { "known_affected": [ "CSAFPID-2631845", "CSAFPID-2631844", "CSAFPID-2631843", "CSAFPID-2631842", "CSAFPID-2631841", "CSAFPID-2631840", "CSAFPID-2631839", "CSAFPID-2631838", "CSAFPID-2631837", "CSAFPID-2631836", "CSAFPID-2631835", "CSAFPID-2631900", "CSAFPID-2632341", "CSAFPID-2632342", "CSAFPID-2632343", "CSAFPID-2631790", "CSAFPID-2632460", "CSAFPID-2632459", "CSAFPID-2631854", "CSAFPID-2631855", "CSAFPID-2632083", "CSAFPID-1296722", "CSAFPID-2631923", "CSAFPID-1296723", "CSAFPID-2631924", "CSAFPID-2631925", "CSAFPID-2631926", "CSAFPID-2631927", "CSAFPID-2631928", "CSAFPID-2631929", "CSAFPID-2631932", "CSAFPID-2631933", "CSAFPID-2631934", "CSAFPID-2631935", "CSAFPID-1765658", "CSAFPID-1765659", "CSAFPID-2631856", "CSAFPID-2631858", "CSAFPID-2631860", "CSAFPID-2631862", "CSAFPID-1765660", "CSAFPID-2631936", "CSAFPID-2631937", "CSAFPID-2631938", "CSAFPID-2631939", "CSAFPID-2631940", "CSAFPID-2631920", "CSAFPID-2631921", "CSAFPID-2631922", "CSAFPID-2631967", "CSAFPID-2631968", "CSAFPID-2631969", "CSAFPID-2632004", "CSAFPID-2632005", "CSAFPID-2632006", "CSAFPID-2632007", "CSAFPID-2632008", "CSAFPID-2631966", "CSAFPID-1765690", "CSAFPID-1765691", "CSAFPID-2459039", "CSAFPID-2631970", "CSAFPID-2631971", "CSAFPID-2631972", "CSAFPID-2631973", "CSAFPID-2631974", "CSAFPID-2631975", "CSAFPID-1765700", "CSAFPID-1765701", "CSAFPID-2631976", "CSAFPID-2631977", "CSAFPID-1296980", "CSAFPID-2631978", "CSAFPID-2631979", "CSAFPID-2631980", "CSAFPID-2631981", "CSAFPID-2631982", "CSAFPID-2631983", "CSAFPID-2631984", "CSAFPID-2631985", "CSAFPID-2632402", "CSAFPID-2631802", "CSAFPID-2631803", "CSAFPID-2631804", "CSAFPID-2631805", "CSAFPID-1296837", "CSAFPID-2631806", "CSAFPID-1211926", "CSAFPID-2619361", "CSAFPID-1209122" ] }, "references": [ { "category": "self", "summary": "CVE-2024-0232", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-0232.json" } ], "title": "CVE-2024-0232" }, { "cve": "CVE-2024-0727", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "other", "text": "NULL Pointer Dereference", "title": "CWE-476" }, { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" } ], "product_status": { "known_affected": [ "CSAFPID-2631845", "CSAFPID-2631844", "CSAFPID-2631843", "CSAFPID-2631842", "CSAFPID-2631841", "CSAFPID-2631840", "CSAFPID-2631839", "CSAFPID-2631838", "CSAFPID-2631837", "CSAFPID-2631836", "CSAFPID-2631835", "CSAFPID-2631900", "CSAFPID-2632341", "CSAFPID-2632342", "CSAFPID-2632343", "CSAFPID-2631790", "CSAFPID-2632460", "CSAFPID-2632459", "CSAFPID-2631854", "CSAFPID-2631855", "CSAFPID-2632083", "CSAFPID-1296722", "CSAFPID-2631923", "CSAFPID-1296723", "CSAFPID-2631924", "CSAFPID-2631925", "CSAFPID-2631926", "CSAFPID-2631927", "CSAFPID-2631928", "CSAFPID-2631929", "CSAFPID-2631932", "CSAFPID-2631933", "CSAFPID-2631934", "CSAFPID-2631935", "CSAFPID-1765658", "CSAFPID-1765659", "CSAFPID-2631856", "CSAFPID-2631858", "CSAFPID-2631860", "CSAFPID-2631862", "CSAFPID-1765660", "CSAFPID-2631936", "CSAFPID-2631937", "CSAFPID-2631938", "CSAFPID-2631939", "CSAFPID-2631940", "CSAFPID-2631920", "CSAFPID-2631921", "CSAFPID-2631922", "CSAFPID-2631967", "CSAFPID-2631968", "CSAFPID-2631969", "CSAFPID-2632004", "CSAFPID-2632005", "CSAFPID-2632006", "CSAFPID-2632007", "CSAFPID-2632008", "CSAFPID-2631966", "CSAFPID-1765690", "CSAFPID-1765691", "CSAFPID-2459039", "CSAFPID-2631970", "CSAFPID-2631971", "CSAFPID-2631972", "CSAFPID-2631973", "CSAFPID-2631974", "CSAFPID-2631975", "CSAFPID-1765700", "CSAFPID-1765701", "CSAFPID-2631976", "CSAFPID-2631977", "CSAFPID-1296980", "CSAFPID-2631978", "CSAFPID-2631979", "CSAFPID-2631980", "CSAFPID-2631981", "CSAFPID-2631982", "CSAFPID-2631983", "CSAFPID-2631984", "CSAFPID-2631985", "CSAFPID-2632402", "CSAFPID-2631802", "CSAFPID-2631803", "CSAFPID-2631804", "CSAFPID-2631805", "CSAFPID-1296837", "CSAFPID-2631806", "CSAFPID-1211926", "CSAFPID-2619361", "CSAFPID-1209122" ] }, "references": [ { "category": "self", "summary": "CVE-2024-0727", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-0727.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-2631845", "CSAFPID-2631844", "CSAFPID-2631843", "CSAFPID-2631842", "CSAFPID-2631841", "CSAFPID-2631840", "CSAFPID-2631839", "CSAFPID-2631838", "CSAFPID-2631837", "CSAFPID-2631836", "CSAFPID-2631835", "CSAFPID-2631900", "CSAFPID-2632341", "CSAFPID-2632342", "CSAFPID-2632343", "CSAFPID-2631790", "CSAFPID-2632460", "CSAFPID-2632459", "CSAFPID-2631854", "CSAFPID-2631855", "CSAFPID-2632083", "CSAFPID-1296722", "CSAFPID-2631923", "CSAFPID-1296723", "CSAFPID-2631924", "CSAFPID-2631925", "CSAFPID-2631926", "CSAFPID-2631927", "CSAFPID-2631928", "CSAFPID-2631929", "CSAFPID-2631932", "CSAFPID-2631933", "CSAFPID-2631934", "CSAFPID-2631935", "CSAFPID-1765658", "CSAFPID-1765659", "CSAFPID-2631856", "CSAFPID-2631858", "CSAFPID-2631860", "CSAFPID-2631862", "CSAFPID-1765660", "CSAFPID-2631936", "CSAFPID-2631937", "CSAFPID-2631938", "CSAFPID-2631939", "CSAFPID-2631940", "CSAFPID-2631920", "CSAFPID-2631921", "CSAFPID-2631922", "CSAFPID-2631967", "CSAFPID-2631968", "CSAFPID-2631969", "CSAFPID-2632004", "CSAFPID-2632005", "CSAFPID-2632006", "CSAFPID-2632007", "CSAFPID-2632008", "CSAFPID-2631966", "CSAFPID-1765690", "CSAFPID-1765691", "CSAFPID-2459039", "CSAFPID-2631970", "CSAFPID-2631971", "CSAFPID-2631972", "CSAFPID-2631973", "CSAFPID-2631974", "CSAFPID-2631975", "CSAFPID-1765700", "CSAFPID-1765701", "CSAFPID-2631976", "CSAFPID-2631977", "CSAFPID-1296980", "CSAFPID-2631978", "CSAFPID-2631979", "CSAFPID-2631980", "CSAFPID-2631981", "CSAFPID-2631982", "CSAFPID-2631983", "CSAFPID-2631984", "CSAFPID-2631985", "CSAFPID-2632402", "CSAFPID-2631802", "CSAFPID-2631803", "CSAFPID-2631804", "CSAFPID-2631805", "CSAFPID-1296837", "CSAFPID-2631806", "CSAFPID-1211926", "CSAFPID-2619361", "CSAFPID-1209122" ] } ], "title": "CVE-2024-0727" }, { "cve": "CVE-2024-5535", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "other", "text": "Exposure of Sensitive Information to an Unauthorized Actor", "title": "CWE-200" }, { "category": "other", "text": "Improper Restriction of Operations within the Bounds of a Memory Buffer", "title": "CWE-119" }, { "category": "other", "text": "Dependency on Vulnerable Third-Party Component", "title": "CWE-1395" } ], "product_status": { "known_affected": [ "CSAFPID-2631845", "CSAFPID-2631844", "CSAFPID-2631843", "CSAFPID-2631842", "CSAFPID-2631841", "CSAFPID-2631840", "CSAFPID-2631839", "CSAFPID-2631838", "CSAFPID-2631837", "CSAFPID-2631836", "CSAFPID-2631835", "CSAFPID-2631900", "CSAFPID-2632341", "CSAFPID-2632342", "CSAFPID-2632343", "CSAFPID-2631790", "CSAFPID-2632460", "CSAFPID-2632459", "CSAFPID-2631854", "CSAFPID-2631855", "CSAFPID-2632083", "CSAFPID-1296722", "CSAFPID-2631923", "CSAFPID-1296723", "CSAFPID-2631924", "CSAFPID-2631925", "CSAFPID-2631926", "CSAFPID-2631927", "CSAFPID-2631928", "CSAFPID-2631929", "CSAFPID-2631932", "CSAFPID-2631933", "CSAFPID-2631934", "CSAFPID-2631935", "CSAFPID-1765658", "CSAFPID-1765659", "CSAFPID-2631856", "CSAFPID-2631858", "CSAFPID-2631860", "CSAFPID-2631862", "CSAFPID-1765660", "CSAFPID-2631936", "CSAFPID-2631937", "CSAFPID-2631938", "CSAFPID-2631939", "CSAFPID-2631940", "CSAFPID-2631920", "CSAFPID-2631921", "CSAFPID-2631922", "CSAFPID-2631967", "CSAFPID-2631968", "CSAFPID-2631969", "CSAFPID-2632004", "CSAFPID-2632005", "CSAFPID-2632006", "CSAFPID-2632007", "CSAFPID-2632008", "CSAFPID-2631966", "CSAFPID-1765690", "CSAFPID-1765691", "CSAFPID-2459039", "CSAFPID-2631970", "CSAFPID-2631971", "CSAFPID-2631972", "CSAFPID-2631973", "CSAFPID-2631974", "CSAFPID-2631975", "CSAFPID-1765700", "CSAFPID-1765701", "CSAFPID-2631976", "CSAFPID-2631977", "CSAFPID-1296980", "CSAFPID-2631978", "CSAFPID-2631979", "CSAFPID-2631980", "CSAFPID-2631981", "CSAFPID-2631982", "CSAFPID-2631983", "CSAFPID-2631984", "CSAFPID-2631985", "CSAFPID-2632402", "CSAFPID-2631802", "CSAFPID-2631803", "CSAFPID-2631804", "CSAFPID-2631805", "CSAFPID-1296837", "CSAFPID-2631806", "CSAFPID-1211926", "CSAFPID-2619361", "CSAFPID-1209122" ] }, "references": [ { "category": "self", "summary": "CVE-2024-5535", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-5535.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.1, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-2631845", "CSAFPID-2631844", "CSAFPID-2631843", "CSAFPID-2631842", "CSAFPID-2631841", "CSAFPID-2631840", "CSAFPID-2631839", "CSAFPID-2631838", "CSAFPID-2631837", "CSAFPID-2631836", "CSAFPID-2631835", "CSAFPID-2631900", "CSAFPID-2632341", "CSAFPID-2632342", "CSAFPID-2632343", "CSAFPID-2631790", "CSAFPID-2632460", "CSAFPID-2632459", "CSAFPID-2631854", "CSAFPID-2631855", "CSAFPID-2632083", "CSAFPID-1296722", "CSAFPID-2631923", "CSAFPID-1296723", "CSAFPID-2631924", "CSAFPID-2631925", "CSAFPID-2631926", "CSAFPID-2631927", "CSAFPID-2631928", "CSAFPID-2631929", "CSAFPID-2631932", "CSAFPID-2631933", "CSAFPID-2631934", "CSAFPID-2631935", "CSAFPID-1765658", "CSAFPID-1765659", "CSAFPID-2631856", "CSAFPID-2631858", "CSAFPID-2631860", "CSAFPID-2631862", "CSAFPID-1765660", "CSAFPID-2631936", "CSAFPID-2631937", "CSAFPID-2631938", "CSAFPID-2631939", "CSAFPID-2631940", "CSAFPID-2631920", "CSAFPID-2631921", "CSAFPID-2631922", "CSAFPID-2631967", "CSAFPID-2631968", "CSAFPID-2631969", "CSAFPID-2632004", "CSAFPID-2632005", "CSAFPID-2632006", "CSAFPID-2632007", "CSAFPID-2632008", "CSAFPID-2631966", "CSAFPID-1765690", "CSAFPID-1765691", "CSAFPID-2459039", "CSAFPID-2631970", "CSAFPID-2631971", "CSAFPID-2631972", "CSAFPID-2631973", "CSAFPID-2631974", "CSAFPID-2631975", "CSAFPID-1765700", "CSAFPID-1765701", "CSAFPID-2631976", "CSAFPID-2631977", "CSAFPID-1296980", "CSAFPID-2631978", "CSAFPID-2631979", "CSAFPID-2631980", "CSAFPID-2631981", "CSAFPID-2631982", "CSAFPID-2631983", "CSAFPID-2631984", "CSAFPID-2631985", "CSAFPID-2632402", "CSAFPID-2631802", "CSAFPID-2631803", "CSAFPID-2631804", "CSAFPID-2631805", "CSAFPID-1296837", "CSAFPID-2631806", "CSAFPID-1211926", "CSAFPID-2619361", "CSAFPID-1209122" ] } ], "title": "CVE-2024-5535" }, { "cve": "CVE-2024-9143", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "other", "text": "Out-of-bounds Write", "title": "CWE-787" }, { "category": "general", "text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N", "title": "CVSSV4" } ], "product_status": { "known_affected": [ "CSAFPID-2631845", "CSAFPID-2631844", "CSAFPID-2631843", "CSAFPID-2631842", "CSAFPID-2631841", "CSAFPID-2631840", "CSAFPID-2631839", "CSAFPID-2631838", "CSAFPID-2631837", "CSAFPID-2631836", "CSAFPID-2631835", "CSAFPID-2631900", "CSAFPID-2632341", "CSAFPID-2632342", "CSAFPID-2632343", "CSAFPID-2631790", "CSAFPID-2632460", "CSAFPID-2632459", "CSAFPID-2631854", "CSAFPID-2631855", "CSAFPID-2632083", "CSAFPID-1296722", "CSAFPID-2631923", "CSAFPID-1296723", "CSAFPID-2631924", "CSAFPID-2631925", "CSAFPID-2631926", "CSAFPID-2631927", "CSAFPID-2631928", "CSAFPID-2631929", "CSAFPID-2631932", "CSAFPID-2631933", "CSAFPID-2631934", "CSAFPID-2631935", "CSAFPID-1765658", "CSAFPID-1765659", "CSAFPID-2631856", "CSAFPID-2631858", "CSAFPID-2631860", "CSAFPID-2631862", "CSAFPID-1765660", "CSAFPID-2631936", "CSAFPID-2631937", "CSAFPID-2631938", "CSAFPID-2631939", "CSAFPID-2631940", "CSAFPID-2631920", "CSAFPID-2631921", "CSAFPID-2631922", "CSAFPID-2631967", "CSAFPID-2631968", "CSAFPID-2631969", "CSAFPID-2632004", "CSAFPID-2632005", "CSAFPID-2632006", "CSAFPID-2632007", "CSAFPID-2632008", "CSAFPID-2631966", "CSAFPID-1765690", "CSAFPID-1765691", "CSAFPID-2459039", "CSAFPID-2631970", "CSAFPID-2631971", "CSAFPID-2631972", "CSAFPID-2631973", "CSAFPID-2631974", "CSAFPID-2631975", "CSAFPID-1765700", "CSAFPID-1765701", "CSAFPID-2631976", "CSAFPID-2631977", "CSAFPID-1296980", "CSAFPID-2631978", "CSAFPID-2631979", "CSAFPID-2631980", "CSAFPID-2631981", "CSAFPID-2631982", "CSAFPID-2631983", "CSAFPID-2631984", "CSAFPID-2631985", "CSAFPID-2632402", "CSAFPID-2631802", "CSAFPID-2631803", "CSAFPID-2631804", "CSAFPID-2631805", "CSAFPID-1296837", "CSAFPID-2631806", "CSAFPID-1211926", "CSAFPID-2619361", "CSAFPID-1209122" ] }, "references": [ { "category": "self", "summary": "CVE-2024-9143", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-9143.json" } ], "title": "CVE-2024-9143" }, { "cve": "CVE-2024-21319", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" }, { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" }, { "category": "other", "text": "Improper Resource Shutdown or Release", "title": "CWE-404" } ], "product_status": { "known_affected": [ "CSAFPID-2631845", "CSAFPID-2631844", "CSAFPID-2631843", "CSAFPID-2631842", "CSAFPID-2631841", "CSAFPID-2631840", "CSAFPID-2631839", "CSAFPID-2631838", "CSAFPID-2631837", "CSAFPID-2631836", "CSAFPID-2631835", "CSAFPID-2631900", "CSAFPID-2632341", "CSAFPID-2632342", "CSAFPID-2632343", "CSAFPID-2631790", "CSAFPID-2632460", "CSAFPID-2632459", "CSAFPID-2631854", "CSAFPID-2631855", "CSAFPID-2632083", "CSAFPID-1296722", "CSAFPID-2631923", "CSAFPID-1296723", "CSAFPID-2631924", "CSAFPID-2631925", "CSAFPID-2631926", "CSAFPID-2631927", "CSAFPID-2631928", "CSAFPID-2631929", "CSAFPID-2631932", "CSAFPID-2631933", "CSAFPID-2631934", "CSAFPID-2631935", "CSAFPID-1765658", "CSAFPID-1765659", "CSAFPID-2631856", "CSAFPID-2631858", "CSAFPID-2631860", "CSAFPID-2631862", "CSAFPID-1765660", "CSAFPID-2631936", "CSAFPID-2631937", "CSAFPID-2631938", "CSAFPID-2631939", "CSAFPID-2631940", "CSAFPID-2631920", "CSAFPID-2631921", "CSAFPID-2631922", "CSAFPID-2631967", "CSAFPID-2631968", "CSAFPID-2631969", "CSAFPID-2632004", "CSAFPID-2632005", "CSAFPID-2632006", "CSAFPID-2632007", "CSAFPID-2632008", "CSAFPID-2631966", "CSAFPID-1765690", "CSAFPID-1765691", "CSAFPID-2459039", "CSAFPID-2631970", "CSAFPID-2631971", "CSAFPID-2631972", "CSAFPID-2631973", "CSAFPID-2631974", "CSAFPID-2631975", "CSAFPID-1765700", "CSAFPID-1765701", "CSAFPID-2631976", "CSAFPID-2631977", "CSAFPID-1296980", "CSAFPID-2631978", "CSAFPID-2631979", "CSAFPID-2631980", "CSAFPID-2631981", "CSAFPID-2631982", "CSAFPID-2631983", "CSAFPID-2631984", "CSAFPID-2631985", "CSAFPID-2632402", "CSAFPID-2631802", "CSAFPID-2631803", "CSAFPID-2631804", "CSAFPID-2631805", "CSAFPID-1296837", "CSAFPID-2631806", "CSAFPID-1211926", "CSAFPID-2619361", "CSAFPID-1209122" ] }, "references": [ { "category": "self", "summary": "CVE-2024-21319", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21319.json" } ], "title": "CVE-2024-21319" }, { "cve": "CVE-2024-23814", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" }, { "category": "general", "text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N", "title": "CVSSV4" } ], "product_status": { "known_affected": [ "CSAFPID-2631845", "CSAFPID-2631844", "CSAFPID-2631843", "CSAFPID-2631842", "CSAFPID-2631841", "CSAFPID-2631840", "CSAFPID-2631839", "CSAFPID-2631838", "CSAFPID-2631837", "CSAFPID-2631836", "CSAFPID-2631835", "CSAFPID-2631900", "CSAFPID-2632341", "CSAFPID-2632342", "CSAFPID-2632343", "CSAFPID-2631790", "CSAFPID-2632460", "CSAFPID-2632459", "CSAFPID-2631854", "CSAFPID-2631855", "CSAFPID-2632083", "CSAFPID-1296722", "CSAFPID-2631923", "CSAFPID-1296723", "CSAFPID-2631924", "CSAFPID-2631925", "CSAFPID-2631926", "CSAFPID-2631927", "CSAFPID-2631928", "CSAFPID-2631929", "CSAFPID-2631932", "CSAFPID-2631933", "CSAFPID-2631934", "CSAFPID-2631935", "CSAFPID-1765658", "CSAFPID-1765659", "CSAFPID-2631856", "CSAFPID-2631858", "CSAFPID-2631860", "CSAFPID-2631862", "CSAFPID-1765660", "CSAFPID-2631936", "CSAFPID-2631937", "CSAFPID-2631938", "CSAFPID-2631939", "CSAFPID-2631940", "CSAFPID-2631920", "CSAFPID-2631921", "CSAFPID-2631922", "CSAFPID-2631967", "CSAFPID-2631968", "CSAFPID-2631969", "CSAFPID-2632004", "CSAFPID-2632005", "CSAFPID-2632006", "CSAFPID-2632007", "CSAFPID-2632008", "CSAFPID-2631966", "CSAFPID-1765690", "CSAFPID-1765691", "CSAFPID-2459039", "CSAFPID-2631970", "CSAFPID-2631971", "CSAFPID-2631972", "CSAFPID-2631973", "CSAFPID-2631974", "CSAFPID-2631975", "CSAFPID-1765700", "CSAFPID-1765701", "CSAFPID-2631976", "CSAFPID-2631977", "CSAFPID-1296980", "CSAFPID-2631978", "CSAFPID-2631979", "CSAFPID-2631980", "CSAFPID-2631981", "CSAFPID-2631982", "CSAFPID-2631983", "CSAFPID-2631984", "CSAFPID-2631985", "CSAFPID-2632402", "CSAFPID-2631802", "CSAFPID-2631803", "CSAFPID-2631804", "CSAFPID-2631805", "CSAFPID-1296837", "CSAFPID-2631806", "CSAFPID-1211926", "CSAFPID-2619361", "CSAFPID-1209122" ] }, "references": [ { "category": "self", "summary": "CVE-2024-23814", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-23814.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-2631845", "CSAFPID-2631844", "CSAFPID-2631843", "CSAFPID-2631842", "CSAFPID-2631841", "CSAFPID-2631840", "CSAFPID-2631839", "CSAFPID-2631838", "CSAFPID-2631837", "CSAFPID-2631836", "CSAFPID-2631835", "CSAFPID-2631900", "CSAFPID-2632341", "CSAFPID-2632342", "CSAFPID-2632343", "CSAFPID-2631790", "CSAFPID-2632460", "CSAFPID-2632459", "CSAFPID-2631854", "CSAFPID-2631855", "CSAFPID-2632083", "CSAFPID-1296722", "CSAFPID-2631923", "CSAFPID-1296723", "CSAFPID-2631924", "CSAFPID-2631925", "CSAFPID-2631926", "CSAFPID-2631927", "CSAFPID-2631928", "CSAFPID-2631929", "CSAFPID-2631932", "CSAFPID-2631933", "CSAFPID-2631934", "CSAFPID-2631935", "CSAFPID-1765658", "CSAFPID-1765659", "CSAFPID-2631856", "CSAFPID-2631858", "CSAFPID-2631860", "CSAFPID-2631862", "CSAFPID-1765660", "CSAFPID-2631936", "CSAFPID-2631937", "CSAFPID-2631938", "CSAFPID-2631939", "CSAFPID-2631940", "CSAFPID-2631920", "CSAFPID-2631921", "CSAFPID-2631922", "CSAFPID-2631967", "CSAFPID-2631968", "CSAFPID-2631969", "CSAFPID-2632004", "CSAFPID-2632005", "CSAFPID-2632006", "CSAFPID-2632007", "CSAFPID-2632008", "CSAFPID-2631966", "CSAFPID-1765690", "CSAFPID-1765691", "CSAFPID-2459039", "CSAFPID-2631970", "CSAFPID-2631971", "CSAFPID-2631972", "CSAFPID-2631973", "CSAFPID-2631974", "CSAFPID-2631975", "CSAFPID-1765700", "CSAFPID-1765701", "CSAFPID-2631976", "CSAFPID-2631977", "CSAFPID-1296980", "CSAFPID-2631978", "CSAFPID-2631979", "CSAFPID-2631980", "CSAFPID-2631981", "CSAFPID-2631982", "CSAFPID-2631983", "CSAFPID-2631984", "CSAFPID-2631985", "CSAFPID-2632402", "CSAFPID-2631802", "CSAFPID-2631803", "CSAFPID-2631804", "CSAFPID-2631805", "CSAFPID-1296837", "CSAFPID-2631806", "CSAFPID-1211926", "CSAFPID-2619361", "CSAFPID-1209122" ] } ], "title": "CVE-2024-23814" }, { "cve": "CVE-2024-30105", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" } ], "product_status": { "known_affected": [ "CSAFPID-2631845", "CSAFPID-2631844", "CSAFPID-2631843", "CSAFPID-2631842", "CSAFPID-2631841", "CSAFPID-2631840", "CSAFPID-2631839", "CSAFPID-2631838", "CSAFPID-2631837", "CSAFPID-2631836", "CSAFPID-2631835", "CSAFPID-2631900", "CSAFPID-2632341", "CSAFPID-2632342", "CSAFPID-2632343", "CSAFPID-2631790", "CSAFPID-2632460", "CSAFPID-2632459", "CSAFPID-2631854", "CSAFPID-2631855", "CSAFPID-2632083", "CSAFPID-1296722", "CSAFPID-2631923", "CSAFPID-1296723", "CSAFPID-2631924", "CSAFPID-2631925", "CSAFPID-2631926", "CSAFPID-2631927", "CSAFPID-2631928", "CSAFPID-2631929", "CSAFPID-2631932", "CSAFPID-2631933", "CSAFPID-2631934", "CSAFPID-2631935", "CSAFPID-1765658", "CSAFPID-1765659", "CSAFPID-2631856", "CSAFPID-2631858", "CSAFPID-2631860", "CSAFPID-2631862", "CSAFPID-1765660", "CSAFPID-2631936", "CSAFPID-2631937", "CSAFPID-2631938", "CSAFPID-2631939", "CSAFPID-2631940", "CSAFPID-2631920", "CSAFPID-2631921", "CSAFPID-2631922", "CSAFPID-2631967", "CSAFPID-2631968", "CSAFPID-2631969", "CSAFPID-2632004", "CSAFPID-2632005", "CSAFPID-2632006", "CSAFPID-2632007", "CSAFPID-2632008", "CSAFPID-2631966", "CSAFPID-1765690", "CSAFPID-1765691", "CSAFPID-2459039", "CSAFPID-2631970", "CSAFPID-2631971", "CSAFPID-2631972", "CSAFPID-2631973", "CSAFPID-2631974", "CSAFPID-2631975", "CSAFPID-1765700", "CSAFPID-1765701", "CSAFPID-2631976", "CSAFPID-2631977", "CSAFPID-1296980", "CSAFPID-2631978", "CSAFPID-2631979", "CSAFPID-2631980", "CSAFPID-2631981", "CSAFPID-2631982", "CSAFPID-2631983", "CSAFPID-2631984", "CSAFPID-2631985", "CSAFPID-2632402", "CSAFPID-2631802", "CSAFPID-2631803", "CSAFPID-2631804", "CSAFPID-2631805", "CSAFPID-1296837", "CSAFPID-2631806", "CSAFPID-1211926", "CSAFPID-2619361", "CSAFPID-1209122" ] }, "references": [ { "category": "self", "summary": "CVE-2024-30105", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-30105.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-2631845", "CSAFPID-2631844", "CSAFPID-2631843", "CSAFPID-2631842", "CSAFPID-2631841", "CSAFPID-2631840", "CSAFPID-2631839", "CSAFPID-2631838", "CSAFPID-2631837", "CSAFPID-2631836", "CSAFPID-2631835", "CSAFPID-2631900", "CSAFPID-2632341", "CSAFPID-2632342", "CSAFPID-2632343", "CSAFPID-2631790", "CSAFPID-2632460", "CSAFPID-2632459", "CSAFPID-2631854", "CSAFPID-2631855", "CSAFPID-2632083", "CSAFPID-1296722", "CSAFPID-2631923", "CSAFPID-1296723", "CSAFPID-2631924", "CSAFPID-2631925", "CSAFPID-2631926", "CSAFPID-2631927", "CSAFPID-2631928", "CSAFPID-2631929", "CSAFPID-2631932", "CSAFPID-2631933", "CSAFPID-2631934", "CSAFPID-2631935", "CSAFPID-1765658", "CSAFPID-1765659", "CSAFPID-2631856", "CSAFPID-2631858", "CSAFPID-2631860", "CSAFPID-2631862", "CSAFPID-1765660", "CSAFPID-2631936", "CSAFPID-2631937", "CSAFPID-2631938", "CSAFPID-2631939", "CSAFPID-2631940", "CSAFPID-2631920", "CSAFPID-2631921", "CSAFPID-2631922", "CSAFPID-2631967", "CSAFPID-2631968", "CSAFPID-2631969", "CSAFPID-2632004", "CSAFPID-2632005", "CSAFPID-2632006", "CSAFPID-2632007", "CSAFPID-2632008", "CSAFPID-2631966", "CSAFPID-1765690", "CSAFPID-1765691", "CSAFPID-2459039", "CSAFPID-2631970", "CSAFPID-2631971", "CSAFPID-2631972", "CSAFPID-2631973", "CSAFPID-2631974", "CSAFPID-2631975", "CSAFPID-1765700", "CSAFPID-1765701", "CSAFPID-2631976", "CSAFPID-2631977", "CSAFPID-1296980", "CSAFPID-2631978", "CSAFPID-2631979", "CSAFPID-2631980", "CSAFPID-2631981", "CSAFPID-2631982", "CSAFPID-2631983", "CSAFPID-2631984", "CSAFPID-2631985", "CSAFPID-2632402", "CSAFPID-2631802", "CSAFPID-2631803", "CSAFPID-2631804", "CSAFPID-2631805", "CSAFPID-1296837", "CSAFPID-2631806", "CSAFPID-1211926", "CSAFPID-2619361", "CSAFPID-1209122" ] } ], "title": "CVE-2024-30105" }, { "cve": "CVE-2024-41788", "cwe": { "id": "CWE-78", "name": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)" }, "notes": [ { "category": "other", "text": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)", "title": "CWE-78" }, { "category": "general", "text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H", "title": "CVSSV4" } ], "product_status": { "known_affected": [ "CSAFPID-2631845", "CSAFPID-2631844", "CSAFPID-2631843", "CSAFPID-2631842", "CSAFPID-2631841", "CSAFPID-2631840", "CSAFPID-2631839", "CSAFPID-2631838", "CSAFPID-2631837", "CSAFPID-2631836", "CSAFPID-2631835", "CSAFPID-2631900", "CSAFPID-2632341", "CSAFPID-2632342", "CSAFPID-2632343", "CSAFPID-2631790", "CSAFPID-2632460", "CSAFPID-2632459", "CSAFPID-2631854", "CSAFPID-2631855", "CSAFPID-2632083", "CSAFPID-1296722", "CSAFPID-2631923", "CSAFPID-1296723", "CSAFPID-2631924", "CSAFPID-2631925", "CSAFPID-2631926", "CSAFPID-2631927", "CSAFPID-2631928", "CSAFPID-2631929", "CSAFPID-2631932", "CSAFPID-2631933", "CSAFPID-2631934", "CSAFPID-2631935", "CSAFPID-1765658", "CSAFPID-1765659", "CSAFPID-2631856", "CSAFPID-2631858", "CSAFPID-2631860", "CSAFPID-2631862", "CSAFPID-1765660", "CSAFPID-2631936", "CSAFPID-2631937", "CSAFPID-2631938", "CSAFPID-2631939", "CSAFPID-2631940", "CSAFPID-2631920", "CSAFPID-2631921", "CSAFPID-2631922", "CSAFPID-2631967", "CSAFPID-2631968", "CSAFPID-2631969", "CSAFPID-2632004", "CSAFPID-2632005", "CSAFPID-2632006", "CSAFPID-2632007", "CSAFPID-2632008", "CSAFPID-2631966", "CSAFPID-1765690", "CSAFPID-1765691", "CSAFPID-2459039", "CSAFPID-2631970", "CSAFPID-2631971", "CSAFPID-2631972", "CSAFPID-2631973", "CSAFPID-2631974", "CSAFPID-2631975", "CSAFPID-1765700", "CSAFPID-1765701", "CSAFPID-2631976", "CSAFPID-2631977", "CSAFPID-1296980", "CSAFPID-2631978", "CSAFPID-2631979", "CSAFPID-2631980", "CSAFPID-2631981", "CSAFPID-2631982", "CSAFPID-2631983", "CSAFPID-2631984", "CSAFPID-2631985", "CSAFPID-2632402", "CSAFPID-2631802", "CSAFPID-2631803", "CSAFPID-2631804", "CSAFPID-2631805", "CSAFPID-1296837", "CSAFPID-2631806", "CSAFPID-1211926", "CSAFPID-2619361", "CSAFPID-1209122" ] }, "references": [ { "category": "self", "summary": "CVE-2024-41788", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-41788.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.1, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-2631845", "CSAFPID-2631844", "CSAFPID-2631843", "CSAFPID-2631842", "CSAFPID-2631841", "CSAFPID-2631840", "CSAFPID-2631839", "CSAFPID-2631838", "CSAFPID-2631837", "CSAFPID-2631836", "CSAFPID-2631835", "CSAFPID-2631900", "CSAFPID-2632341", "CSAFPID-2632342", "CSAFPID-2632343", "CSAFPID-2631790", "CSAFPID-2632460", "CSAFPID-2632459", "CSAFPID-2631854", "CSAFPID-2631855", "CSAFPID-2632083", "CSAFPID-1296722", "CSAFPID-2631923", "CSAFPID-1296723", "CSAFPID-2631924", "CSAFPID-2631925", "CSAFPID-2631926", "CSAFPID-2631927", "CSAFPID-2631928", "CSAFPID-2631929", "CSAFPID-2631932", "CSAFPID-2631933", "CSAFPID-2631934", "CSAFPID-2631935", "CSAFPID-1765658", "CSAFPID-1765659", "CSAFPID-2631856", "CSAFPID-2631858", "CSAFPID-2631860", "CSAFPID-2631862", "CSAFPID-1765660", "CSAFPID-2631936", "CSAFPID-2631937", "CSAFPID-2631938", "CSAFPID-2631939", "CSAFPID-2631940", "CSAFPID-2631920", "CSAFPID-2631921", "CSAFPID-2631922", "CSAFPID-2631967", "CSAFPID-2631968", "CSAFPID-2631969", "CSAFPID-2632004", "CSAFPID-2632005", "CSAFPID-2632006", "CSAFPID-2632007", "CSAFPID-2632008", "CSAFPID-2631966", "CSAFPID-1765690", "CSAFPID-1765691", "CSAFPID-2459039", "CSAFPID-2631970", "CSAFPID-2631971", "CSAFPID-2631972", "CSAFPID-2631973", "CSAFPID-2631974", "CSAFPID-2631975", "CSAFPID-1765700", "CSAFPID-1765701", "CSAFPID-2631976", "CSAFPID-2631977", "CSAFPID-1296980", "CSAFPID-2631978", "CSAFPID-2631979", "CSAFPID-2631980", "CSAFPID-2631981", "CSAFPID-2631982", "CSAFPID-2631983", "CSAFPID-2631984", "CSAFPID-2631985", "CSAFPID-2632402", "CSAFPID-2631802", "CSAFPID-2631803", "CSAFPID-2631804", "CSAFPID-2631805", "CSAFPID-1296837", "CSAFPID-2631806", "CSAFPID-1211926", "CSAFPID-2619361", "CSAFPID-1209122" ] } ], "title": "CVE-2024-41788" }, { "cve": "CVE-2024-41789", "cwe": { "id": "CWE-78", "name": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)" }, "notes": [ { "category": "other", "text": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)", "title": "CWE-78" }, { "category": "general", "text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H", "title": "CVSSV4" } ], "product_status": { "known_affected": [ "CSAFPID-2631845", "CSAFPID-2631844", "CSAFPID-2631843", "CSAFPID-2631842", "CSAFPID-2631841", "CSAFPID-2631840", "CSAFPID-2631839", "CSAFPID-2631838", "CSAFPID-2631837", "CSAFPID-2631836", "CSAFPID-2631835", "CSAFPID-2631900", "CSAFPID-2632341", "CSAFPID-2632342", "CSAFPID-2632343", "CSAFPID-2631790", "CSAFPID-2632460", "CSAFPID-2632459", "CSAFPID-2631854", "CSAFPID-2631855", "CSAFPID-2632083", "CSAFPID-1296722", "CSAFPID-2631923", "CSAFPID-1296723", "CSAFPID-2631924", "CSAFPID-2631925", "CSAFPID-2631926", "CSAFPID-2631927", "CSAFPID-2631928", "CSAFPID-2631929", "CSAFPID-2631932", "CSAFPID-2631933", "CSAFPID-2631934", "CSAFPID-2631935", "CSAFPID-1765658", "CSAFPID-1765659", "CSAFPID-2631856", "CSAFPID-2631858", "CSAFPID-2631860", "CSAFPID-2631862", "CSAFPID-1765660", "CSAFPID-2631936", "CSAFPID-2631937", "CSAFPID-2631938", "CSAFPID-2631939", "CSAFPID-2631940", "CSAFPID-2631920", "CSAFPID-2631921", "CSAFPID-2631922", "CSAFPID-2631967", "CSAFPID-2631968", "CSAFPID-2631969", "CSAFPID-2632004", "CSAFPID-2632005", "CSAFPID-2632006", "CSAFPID-2632007", "CSAFPID-2632008", "CSAFPID-2631966", "CSAFPID-1765690", "CSAFPID-1765691", "CSAFPID-2459039", "CSAFPID-2631970", "CSAFPID-2631971", "CSAFPID-2631972", "CSAFPID-2631973", "CSAFPID-2631974", "CSAFPID-2631975", "CSAFPID-1765700", "CSAFPID-1765701", "CSAFPID-2631976", "CSAFPID-2631977", "CSAFPID-1296980", "CSAFPID-2631978", "CSAFPID-2631979", "CSAFPID-2631980", "CSAFPID-2631981", "CSAFPID-2631982", "CSAFPID-2631983", "CSAFPID-2631984", "CSAFPID-2631985", "CSAFPID-2632402", "CSAFPID-2631802", "CSAFPID-2631803", "CSAFPID-2631804", "CSAFPID-2631805", "CSAFPID-1296837", "CSAFPID-2631806", "CSAFPID-1211926", "CSAFPID-2619361", "CSAFPID-1209122" ] }, "references": [ { "category": "self", "summary": "CVE-2024-41789", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-41789.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.1, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-2631845", "CSAFPID-2631844", "CSAFPID-2631843", "CSAFPID-2631842", "CSAFPID-2631841", "CSAFPID-2631840", "CSAFPID-2631839", "CSAFPID-2631838", "CSAFPID-2631837", "CSAFPID-2631836", "CSAFPID-2631835", "CSAFPID-2631900", "CSAFPID-2632341", "CSAFPID-2632342", "CSAFPID-2632343", "CSAFPID-2631790", "CSAFPID-2632460", "CSAFPID-2632459", "CSAFPID-2631854", "CSAFPID-2631855", "CSAFPID-2632083", "CSAFPID-1296722", "CSAFPID-2631923", "CSAFPID-1296723", "CSAFPID-2631924", "CSAFPID-2631925", "CSAFPID-2631926", "CSAFPID-2631927", "CSAFPID-2631928", "CSAFPID-2631929", "CSAFPID-2631932", "CSAFPID-2631933", "CSAFPID-2631934", "CSAFPID-2631935", "CSAFPID-1765658", "CSAFPID-1765659", "CSAFPID-2631856", "CSAFPID-2631858", "CSAFPID-2631860", "CSAFPID-2631862", "CSAFPID-1765660", "CSAFPID-2631936", "CSAFPID-2631937", "CSAFPID-2631938", "CSAFPID-2631939", "CSAFPID-2631940", "CSAFPID-2631920", "CSAFPID-2631921", "CSAFPID-2631922", "CSAFPID-2631967", "CSAFPID-2631968", "CSAFPID-2631969", "CSAFPID-2632004", "CSAFPID-2632005", "CSAFPID-2632006", "CSAFPID-2632007", "CSAFPID-2632008", "CSAFPID-2631966", "CSAFPID-1765690", "CSAFPID-1765691", "CSAFPID-2459039", "CSAFPID-2631970", "CSAFPID-2631971", "CSAFPID-2631972", "CSAFPID-2631973", "CSAFPID-2631974", "CSAFPID-2631975", "CSAFPID-1765700", "CSAFPID-1765701", "CSAFPID-2631976", "CSAFPID-2631977", "CSAFPID-1296980", "CSAFPID-2631978", "CSAFPID-2631979", "CSAFPID-2631980", "CSAFPID-2631981", "CSAFPID-2631982", "CSAFPID-2631983", "CSAFPID-2631984", "CSAFPID-2631985", "CSAFPID-2632402", "CSAFPID-2631802", "CSAFPID-2631803", "CSAFPID-2631804", "CSAFPID-2631805", "CSAFPID-1296837", "CSAFPID-2631806", "CSAFPID-1211926", "CSAFPID-2619361", "CSAFPID-1209122" ] } ], "title": "CVE-2024-41789" }, { "cve": "CVE-2024-41790", "cwe": { "id": "CWE-78", "name": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)" }, "notes": [ { "category": "other", "text": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)", "title": "CWE-78" }, { "category": "general", "text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H", "title": "CVSSV4" } ], "product_status": { "known_affected": [ "CSAFPID-2631845", "CSAFPID-2631844", "CSAFPID-2631843", "CSAFPID-2631842", "CSAFPID-2631841", "CSAFPID-2631840", "CSAFPID-2631839", "CSAFPID-2631838", "CSAFPID-2631837", "CSAFPID-2631836", "CSAFPID-2631835", "CSAFPID-2631900", "CSAFPID-2632341", "CSAFPID-2632342", "CSAFPID-2632343", "CSAFPID-2631790", "CSAFPID-2632460", "CSAFPID-2632459", "CSAFPID-2631854", "CSAFPID-2631855", "CSAFPID-2632083", "CSAFPID-1296722", "CSAFPID-2631923", "CSAFPID-1296723", "CSAFPID-2631924", "CSAFPID-2631925", "CSAFPID-2631926", "CSAFPID-2631927", "CSAFPID-2631928", "CSAFPID-2631929", "CSAFPID-2631932", "CSAFPID-2631933", "CSAFPID-2631934", "CSAFPID-2631935", "CSAFPID-1765658", "CSAFPID-1765659", "CSAFPID-2631856", "CSAFPID-2631858", "CSAFPID-2631860", "CSAFPID-2631862", "CSAFPID-1765660", "CSAFPID-2631936", "CSAFPID-2631937", "CSAFPID-2631938", "CSAFPID-2631939", "CSAFPID-2631940", "CSAFPID-2631920", "CSAFPID-2631921", "CSAFPID-2631922", "CSAFPID-2631967", "CSAFPID-2631968", "CSAFPID-2631969", "CSAFPID-2632004", "CSAFPID-2632005", "CSAFPID-2632006", "CSAFPID-2632007", "CSAFPID-2632008", "CSAFPID-2631966", "CSAFPID-1765690", "CSAFPID-1765691", "CSAFPID-2459039", "CSAFPID-2631970", "CSAFPID-2631971", "CSAFPID-2631972", "CSAFPID-2631973", "CSAFPID-2631974", "CSAFPID-2631975", "CSAFPID-1765700", "CSAFPID-1765701", "CSAFPID-2631976", "CSAFPID-2631977", "CSAFPID-1296980", "CSAFPID-2631978", "CSAFPID-2631979", "CSAFPID-2631980", "CSAFPID-2631981", "CSAFPID-2631982", "CSAFPID-2631983", "CSAFPID-2631984", "CSAFPID-2631985", "CSAFPID-2632402", "CSAFPID-2631802", "CSAFPID-2631803", "CSAFPID-2631804", "CSAFPID-2631805", "CSAFPID-1296837", "CSAFPID-2631806", "CSAFPID-1211926", "CSAFPID-2619361", "CSAFPID-1209122" ] }, "references": [ { "category": "self", "summary": "CVE-2024-41790", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-41790.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.1, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-2631845", "CSAFPID-2631844", "CSAFPID-2631843", "CSAFPID-2631842", "CSAFPID-2631841", "CSAFPID-2631840", "CSAFPID-2631839", "CSAFPID-2631838", "CSAFPID-2631837", "CSAFPID-2631836", "CSAFPID-2631835", "CSAFPID-2631900", "CSAFPID-2632341", "CSAFPID-2632342", "CSAFPID-2632343", "CSAFPID-2631790", "CSAFPID-2632460", "CSAFPID-2632459", "CSAFPID-2631854", "CSAFPID-2631855", "CSAFPID-2632083", "CSAFPID-1296722", "CSAFPID-2631923", "CSAFPID-1296723", "CSAFPID-2631924", "CSAFPID-2631925", "CSAFPID-2631926", "CSAFPID-2631927", "CSAFPID-2631928", "CSAFPID-2631929", "CSAFPID-2631932", "CSAFPID-2631933", "CSAFPID-2631934", "CSAFPID-2631935", "CSAFPID-1765658", "CSAFPID-1765659", "CSAFPID-2631856", "CSAFPID-2631858", "CSAFPID-2631860", "CSAFPID-2631862", "CSAFPID-1765660", "CSAFPID-2631936", "CSAFPID-2631937", "CSAFPID-2631938", "CSAFPID-2631939", "CSAFPID-2631940", "CSAFPID-2631920", "CSAFPID-2631921", "CSAFPID-2631922", "CSAFPID-2631967", "CSAFPID-2631968", "CSAFPID-2631969", "CSAFPID-2632004", "CSAFPID-2632005", "CSAFPID-2632006", "CSAFPID-2632007", "CSAFPID-2632008", "CSAFPID-2631966", "CSAFPID-1765690", "CSAFPID-1765691", "CSAFPID-2459039", "CSAFPID-2631970", "CSAFPID-2631971", "CSAFPID-2631972", "CSAFPID-2631973", "CSAFPID-2631974", "CSAFPID-2631975", "CSAFPID-1765700", "CSAFPID-1765701", "CSAFPID-2631976", "CSAFPID-2631977", "CSAFPID-1296980", "CSAFPID-2631978", "CSAFPID-2631979", "CSAFPID-2631980", "CSAFPID-2631981", "CSAFPID-2631982", "CSAFPID-2631983", "CSAFPID-2631984", "CSAFPID-2631985", "CSAFPID-2632402", "CSAFPID-2631802", "CSAFPID-2631803", "CSAFPID-2631804", "CSAFPID-2631805", "CSAFPID-1296837", "CSAFPID-2631806", "CSAFPID-1211926", "CSAFPID-2619361", "CSAFPID-1209122" ] } ], "title": "CVE-2024-41790" }, { "cve": "CVE-2024-41791", "cwe": { "id": "CWE-306", "name": "Missing Authentication for Critical Function" }, "notes": [ { "category": "other", "text": "Missing Authentication for Critical Function", "title": "CWE-306" }, { "category": "general", "text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N", "title": "CVSSV4" } ], "product_status": { "known_affected": [ "CSAFPID-2631845", "CSAFPID-2631844", "CSAFPID-2631843", "CSAFPID-2631842", "CSAFPID-2631841", "CSAFPID-2631840", "CSAFPID-2631839", "CSAFPID-2631838", "CSAFPID-2631837", "CSAFPID-2631836", "CSAFPID-2631835", "CSAFPID-2631900", "CSAFPID-2632341", "CSAFPID-2632342", "CSAFPID-2632343", "CSAFPID-2631790", "CSAFPID-2632460", "CSAFPID-2632459", "CSAFPID-2631854", "CSAFPID-2631855", "CSAFPID-2632083", "CSAFPID-1296722", "CSAFPID-2631923", "CSAFPID-1296723", "CSAFPID-2631924", "CSAFPID-2631925", "CSAFPID-2631926", "CSAFPID-2631927", "CSAFPID-2631928", "CSAFPID-2631929", "CSAFPID-2631932", "CSAFPID-2631933", "CSAFPID-2631934", "CSAFPID-2631935", "CSAFPID-1765658", "CSAFPID-1765659", "CSAFPID-2631856", "CSAFPID-2631858", "CSAFPID-2631860", "CSAFPID-2631862", "CSAFPID-1765660", "CSAFPID-2631936", "CSAFPID-2631937", "CSAFPID-2631938", "CSAFPID-2631939", "CSAFPID-2631940", "CSAFPID-2631920", "CSAFPID-2631921", "CSAFPID-2631922", "CSAFPID-2631967", "CSAFPID-2631968", "CSAFPID-2631969", "CSAFPID-2632004", "CSAFPID-2632005", "CSAFPID-2632006", "CSAFPID-2632007", "CSAFPID-2632008", "CSAFPID-2631966", "CSAFPID-1765690", "CSAFPID-1765691", "CSAFPID-2459039", "CSAFPID-2631970", "CSAFPID-2631971", "CSAFPID-2631972", "CSAFPID-2631973", "CSAFPID-2631974", "CSAFPID-2631975", "CSAFPID-1765700", "CSAFPID-1765701", "CSAFPID-2631976", "CSAFPID-2631977", "CSAFPID-1296980", "CSAFPID-2631978", "CSAFPID-2631979", "CSAFPID-2631980", "CSAFPID-2631981", "CSAFPID-2631982", "CSAFPID-2631983", "CSAFPID-2631984", "CSAFPID-2631985", "CSAFPID-2632402", "CSAFPID-2631802", "CSAFPID-2631803", "CSAFPID-2631804", "CSAFPID-2631805", "CSAFPID-1296837", "CSAFPID-2631806", "CSAFPID-1211926", "CSAFPID-2619361", "CSAFPID-1209122" ] }, "references": [ { "category": "self", "summary": "CVE-2024-41791", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-41791.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "CSAFPID-2631845", "CSAFPID-2631844", "CSAFPID-2631843", "CSAFPID-2631842", "CSAFPID-2631841", "CSAFPID-2631840", "CSAFPID-2631839", "CSAFPID-2631838", "CSAFPID-2631837", "CSAFPID-2631836", "CSAFPID-2631835", "CSAFPID-2631900", "CSAFPID-2632341", "CSAFPID-2632342", "CSAFPID-2632343", "CSAFPID-2631790", "CSAFPID-2632460", "CSAFPID-2632459", "CSAFPID-2631854", "CSAFPID-2631855", "CSAFPID-2632083", "CSAFPID-1296722", "CSAFPID-2631923", "CSAFPID-1296723", "CSAFPID-2631924", "CSAFPID-2631925", "CSAFPID-2631926", "CSAFPID-2631927", "CSAFPID-2631928", "CSAFPID-2631929", "CSAFPID-2631932", "CSAFPID-2631933", "CSAFPID-2631934", "CSAFPID-2631935", "CSAFPID-1765658", "CSAFPID-1765659", "CSAFPID-2631856", "CSAFPID-2631858", "CSAFPID-2631860", "CSAFPID-2631862", "CSAFPID-1765660", "CSAFPID-2631936", "CSAFPID-2631937", "CSAFPID-2631938", "CSAFPID-2631939", "CSAFPID-2631940", "CSAFPID-2631920", "CSAFPID-2631921", "CSAFPID-2631922", "CSAFPID-2631967", "CSAFPID-2631968", "CSAFPID-2631969", "CSAFPID-2632004", "CSAFPID-2632005", "CSAFPID-2632006", "CSAFPID-2632007", "CSAFPID-2632008", "CSAFPID-2631966", "CSAFPID-1765690", "CSAFPID-1765691", "CSAFPID-2459039", "CSAFPID-2631970", "CSAFPID-2631971", "CSAFPID-2631972", "CSAFPID-2631973", "CSAFPID-2631974", "CSAFPID-2631975", "CSAFPID-1765700", "CSAFPID-1765701", "CSAFPID-2631976", "CSAFPID-2631977", "CSAFPID-1296980", "CSAFPID-2631978", "CSAFPID-2631979", "CSAFPID-2631980", "CSAFPID-2631981", "CSAFPID-2631982", "CSAFPID-2631983", "CSAFPID-2631984", "CSAFPID-2631985", "CSAFPID-2632402", "CSAFPID-2631802", "CSAFPID-2631803", "CSAFPID-2631804", "CSAFPID-2631805", "CSAFPID-1296837", "CSAFPID-2631806", "CSAFPID-1211926", "CSAFPID-2619361", "CSAFPID-1209122" ] } ], "title": "CVE-2024-41791" }, { "cve": "CVE-2024-41792", "cwe": { "id": "CWE-22", "name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)" }, "notes": [ { "category": "other", "text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)", "title": "CWE-22" }, { "category": "general", "text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N", "title": "CVSSV4" } ], "product_status": { "known_affected": [ "CSAFPID-2631845", "CSAFPID-2631844", "CSAFPID-2631843", "CSAFPID-2631842", "CSAFPID-2631841", "CSAFPID-2631840", "CSAFPID-2631839", "CSAFPID-2631838", "CSAFPID-2631837", "CSAFPID-2631836", "CSAFPID-2631835", "CSAFPID-2631900", "CSAFPID-2632341", "CSAFPID-2632342", "CSAFPID-2632343", "CSAFPID-2631790", "CSAFPID-2632460", "CSAFPID-2632459", "CSAFPID-2631854", "CSAFPID-2631855", "CSAFPID-2632083", "CSAFPID-1296722", "CSAFPID-2631923", "CSAFPID-1296723", "CSAFPID-2631924", "CSAFPID-2631925", "CSAFPID-2631926", "CSAFPID-2631927", "CSAFPID-2631928", "CSAFPID-2631929", "CSAFPID-2631932", "CSAFPID-2631933", "CSAFPID-2631934", "CSAFPID-2631935", "CSAFPID-1765658", "CSAFPID-1765659", "CSAFPID-2631856", "CSAFPID-2631858", "CSAFPID-2631860", "CSAFPID-2631862", "CSAFPID-1765660", "CSAFPID-2631936", "CSAFPID-2631937", "CSAFPID-2631938", "CSAFPID-2631939", "CSAFPID-2631940", "CSAFPID-2631920", "CSAFPID-2631921", "CSAFPID-2631922", "CSAFPID-2631967", "CSAFPID-2631968", "CSAFPID-2631969", "CSAFPID-2632004", "CSAFPID-2632005", "CSAFPID-2632006", "CSAFPID-2632007", "CSAFPID-2632008", "CSAFPID-2631966", "CSAFPID-1765690", "CSAFPID-1765691", "CSAFPID-2459039", "CSAFPID-2631970", "CSAFPID-2631971", "CSAFPID-2631972", "CSAFPID-2631973", "CSAFPID-2631974", "CSAFPID-2631975", "CSAFPID-1765700", "CSAFPID-1765701", "CSAFPID-2631976", "CSAFPID-2631977", "CSAFPID-1296980", "CSAFPID-2631978", "CSAFPID-2631979", "CSAFPID-2631980", "CSAFPID-2631981", "CSAFPID-2631982", "CSAFPID-2631983", "CSAFPID-2631984", "CSAFPID-2631985", "CSAFPID-2632402", "CSAFPID-2631802", "CSAFPID-2631803", "CSAFPID-2631804", "CSAFPID-2631805", "CSAFPID-1296837", "CSAFPID-2631806", "CSAFPID-1211926", "CSAFPID-2619361", "CSAFPID-1209122" ] }, "references": [ { "category": "self", "summary": "CVE-2024-41792", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-41792.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.6, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-2631845", "CSAFPID-2631844", "CSAFPID-2631843", "CSAFPID-2631842", "CSAFPID-2631841", "CSAFPID-2631840", "CSAFPID-2631839", "CSAFPID-2631838", "CSAFPID-2631837", "CSAFPID-2631836", "CSAFPID-2631835", "CSAFPID-2631900", "CSAFPID-2632341", "CSAFPID-2632342", "CSAFPID-2632343", "CSAFPID-2631790", "CSAFPID-2632460", "CSAFPID-2632459", "CSAFPID-2631854", "CSAFPID-2631855", "CSAFPID-2632083", "CSAFPID-1296722", "CSAFPID-2631923", "CSAFPID-1296723", "CSAFPID-2631924", "CSAFPID-2631925", "CSAFPID-2631926", "CSAFPID-2631927", "CSAFPID-2631928", "CSAFPID-2631929", "CSAFPID-2631932", "CSAFPID-2631933", "CSAFPID-2631934", "CSAFPID-2631935", "CSAFPID-1765658", "CSAFPID-1765659", "CSAFPID-2631856", "CSAFPID-2631858", "CSAFPID-2631860", "CSAFPID-2631862", "CSAFPID-1765660", "CSAFPID-2631936", "CSAFPID-2631937", "CSAFPID-2631938", "CSAFPID-2631939", "CSAFPID-2631940", "CSAFPID-2631920", "CSAFPID-2631921", "CSAFPID-2631922", "CSAFPID-2631967", "CSAFPID-2631968", "CSAFPID-2631969", "CSAFPID-2632004", "CSAFPID-2632005", "CSAFPID-2632006", "CSAFPID-2632007", "CSAFPID-2632008", "CSAFPID-2631966", "CSAFPID-1765690", "CSAFPID-1765691", "CSAFPID-2459039", "CSAFPID-2631970", "CSAFPID-2631971", "CSAFPID-2631972", "CSAFPID-2631973", "CSAFPID-2631974", "CSAFPID-2631975", "CSAFPID-1765700", "CSAFPID-1765701", "CSAFPID-2631976", "CSAFPID-2631977", "CSAFPID-1296980", "CSAFPID-2631978", "CSAFPID-2631979", "CSAFPID-2631980", "CSAFPID-2631981", "CSAFPID-2631982", "CSAFPID-2631983", "CSAFPID-2631984", "CSAFPID-2631985", "CSAFPID-2632402", "CSAFPID-2631802", "CSAFPID-2631803", "CSAFPID-2631804", "CSAFPID-2631805", "CSAFPID-1296837", "CSAFPID-2631806", "CSAFPID-1211926", "CSAFPID-2619361", "CSAFPID-1209122" ] } ], "title": "CVE-2024-41792" }, { "cve": "CVE-2024-41793", "cwe": { "id": "CWE-306", "name": "Missing Authentication for Critical Function" }, "notes": [ { "category": "other", "text": "Missing Authentication for Critical Function", "title": "CWE-306" }, { "category": "general", "text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:H/SA:N", "title": "CVSSV4" } ], "product_status": { "known_affected": [ "CSAFPID-2631845", "CSAFPID-2631844", "CSAFPID-2631843", "CSAFPID-2631842", "CSAFPID-2631841", "CSAFPID-2631840", "CSAFPID-2631839", "CSAFPID-2631838", "CSAFPID-2631837", "CSAFPID-2631836", "CSAFPID-2631835", "CSAFPID-2631900", "CSAFPID-2632341", "CSAFPID-2632342", "CSAFPID-2632343", "CSAFPID-2631790", "CSAFPID-2632460", "CSAFPID-2632459", "CSAFPID-2631854", "CSAFPID-2631855", "CSAFPID-2632083", "CSAFPID-1296722", "CSAFPID-2631923", "CSAFPID-1296723", "CSAFPID-2631924", "CSAFPID-2631925", "CSAFPID-2631926", "CSAFPID-2631927", "CSAFPID-2631928", "CSAFPID-2631929", "CSAFPID-2631932", "CSAFPID-2631933", "CSAFPID-2631934", "CSAFPID-2631935", "CSAFPID-1765658", "CSAFPID-1765659", "CSAFPID-2631856", "CSAFPID-2631858", "CSAFPID-2631860", "CSAFPID-2631862", "CSAFPID-1765660", "CSAFPID-2631936", "CSAFPID-2631937", "CSAFPID-2631938", "CSAFPID-2631939", "CSAFPID-2631940", "CSAFPID-2631920", "CSAFPID-2631921", "CSAFPID-2631922", "CSAFPID-2631967", "CSAFPID-2631968", "CSAFPID-2631969", "CSAFPID-2632004", "CSAFPID-2632005", "CSAFPID-2632006", "CSAFPID-2632007", "CSAFPID-2632008", "CSAFPID-2631966", "CSAFPID-1765690", "CSAFPID-1765691", "CSAFPID-2459039", "CSAFPID-2631970", "CSAFPID-2631971", "CSAFPID-2631972", "CSAFPID-2631973", "CSAFPID-2631974", "CSAFPID-2631975", "CSAFPID-1765700", "CSAFPID-1765701", "CSAFPID-2631976", "CSAFPID-2631977", "CSAFPID-1296980", "CSAFPID-2631978", "CSAFPID-2631979", "CSAFPID-2631980", "CSAFPID-2631981", "CSAFPID-2631982", "CSAFPID-2631983", "CSAFPID-2631984", "CSAFPID-2631985", "CSAFPID-2632402", "CSAFPID-2631802", "CSAFPID-2631803", "CSAFPID-2631804", "CSAFPID-2631805", "CSAFPID-1296837", "CSAFPID-2631806", "CSAFPID-1211926", "CSAFPID-2619361", "CSAFPID-1209122" ] }, "references": [ { "category": "self", "summary": "CVE-2024-41793", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-41793.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.6, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-2631845", "CSAFPID-2631844", "CSAFPID-2631843", "CSAFPID-2631842", "CSAFPID-2631841", "CSAFPID-2631840", "CSAFPID-2631839", "CSAFPID-2631838", "CSAFPID-2631837", "CSAFPID-2631836", "CSAFPID-2631835", "CSAFPID-2631900", "CSAFPID-2632341", "CSAFPID-2632342", "CSAFPID-2632343", "CSAFPID-2631790", "CSAFPID-2632460", "CSAFPID-2632459", "CSAFPID-2631854", "CSAFPID-2631855", "CSAFPID-2632083", "CSAFPID-1296722", "CSAFPID-2631923", "CSAFPID-1296723", "CSAFPID-2631924", "CSAFPID-2631925", "CSAFPID-2631926", "CSAFPID-2631927", "CSAFPID-2631928", "CSAFPID-2631929", "CSAFPID-2631932", "CSAFPID-2631933", "CSAFPID-2631934", "CSAFPID-2631935", "CSAFPID-1765658", "CSAFPID-1765659", "CSAFPID-2631856", "CSAFPID-2631858", "CSAFPID-2631860", "CSAFPID-2631862", "CSAFPID-1765660", "CSAFPID-2631936", "CSAFPID-2631937", "CSAFPID-2631938", "CSAFPID-2631939", "CSAFPID-2631940", "CSAFPID-2631920", "CSAFPID-2631921", "CSAFPID-2631922", "CSAFPID-2631967", "CSAFPID-2631968", "CSAFPID-2631969", "CSAFPID-2632004", "CSAFPID-2632005", "CSAFPID-2632006", "CSAFPID-2632007", "CSAFPID-2632008", "CSAFPID-2631966", "CSAFPID-1765690", "CSAFPID-1765691", "CSAFPID-2459039", "CSAFPID-2631970", "CSAFPID-2631971", "CSAFPID-2631972", "CSAFPID-2631973", "CSAFPID-2631974", "CSAFPID-2631975", "CSAFPID-1765700", "CSAFPID-1765701", "CSAFPID-2631976", "CSAFPID-2631977", "CSAFPID-1296980", "CSAFPID-2631978", "CSAFPID-2631979", "CSAFPID-2631980", "CSAFPID-2631981", "CSAFPID-2631982", "CSAFPID-2631983", "CSAFPID-2631984", "CSAFPID-2631985", "CSAFPID-2632402", "CSAFPID-2631802", "CSAFPID-2631803", "CSAFPID-2631804", "CSAFPID-2631805", "CSAFPID-1296837", "CSAFPID-2631806", "CSAFPID-1211926", "CSAFPID-2619361", "CSAFPID-1209122" ] } ], "title": "CVE-2024-41793" }, { "cve": "CVE-2024-41794", "cwe": { "id": "CWE-798", "name": "Use of Hard-coded Credentials" }, "notes": [ { "category": "other", "text": "Use of Hard-coded Credentials", "title": "CWE-798" }, { "category": "general", "text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H", "title": "CVSSV4" } ], "product_status": { "known_affected": [ "CSAFPID-2631845", "CSAFPID-2631844", "CSAFPID-2631843", "CSAFPID-2631842", "CSAFPID-2631841", "CSAFPID-2631840", "CSAFPID-2631839", "CSAFPID-2631838", "CSAFPID-2631837", "CSAFPID-2631836", "CSAFPID-2631835", "CSAFPID-2631900", "CSAFPID-2632341", "CSAFPID-2632342", "CSAFPID-2632343", "CSAFPID-2631790", "CSAFPID-2632460", "CSAFPID-2632459", "CSAFPID-2631854", "CSAFPID-2631855", "CSAFPID-2632083", "CSAFPID-1296722", "CSAFPID-2631923", "CSAFPID-1296723", "CSAFPID-2631924", "CSAFPID-2631925", "CSAFPID-2631926", "CSAFPID-2631927", "CSAFPID-2631928", "CSAFPID-2631929", "CSAFPID-2631932", "CSAFPID-2631933", "CSAFPID-2631934", "CSAFPID-2631935", "CSAFPID-1765658", "CSAFPID-1765659", "CSAFPID-2631856", "CSAFPID-2631858", "CSAFPID-2631860", "CSAFPID-2631862", "CSAFPID-1765660", "CSAFPID-2631936", "CSAFPID-2631937", "CSAFPID-2631938", "CSAFPID-2631939", "CSAFPID-2631940", "CSAFPID-2631920", "CSAFPID-2631921", "CSAFPID-2631922", "CSAFPID-2631967", "CSAFPID-2631968", "CSAFPID-2631969", "CSAFPID-2632004", "CSAFPID-2632005", "CSAFPID-2632006", "CSAFPID-2632007", "CSAFPID-2632008", "CSAFPID-2631966", "CSAFPID-1765690", "CSAFPID-1765691", "CSAFPID-2459039", "CSAFPID-2631970", "CSAFPID-2631971", "CSAFPID-2631972", "CSAFPID-2631973", "CSAFPID-2631974", "CSAFPID-2631975", "CSAFPID-1765700", "CSAFPID-1765701", "CSAFPID-2631976", "CSAFPID-2631977", "CSAFPID-1296980", "CSAFPID-2631978", "CSAFPID-2631979", "CSAFPID-2631980", "CSAFPID-2631981", "CSAFPID-2631982", "CSAFPID-2631983", "CSAFPID-2631984", "CSAFPID-2631985", "CSAFPID-2632402", "CSAFPID-2631802", "CSAFPID-2631803", "CSAFPID-2631804", "CSAFPID-2631805", "CSAFPID-1296837", "CSAFPID-2631806", "CSAFPID-1211926", "CSAFPID-2619361", "CSAFPID-1209122" ] }, "references": [ { "category": "self", "summary": "CVE-2024-41794", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-41794.json" } ], "scores": [ { "cvss_v3": { "baseScore": 10.0, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-2631845", "CSAFPID-2631844", "CSAFPID-2631843", "CSAFPID-2631842", "CSAFPID-2631841", "CSAFPID-2631840", "CSAFPID-2631839", "CSAFPID-2631838", "CSAFPID-2631837", "CSAFPID-2631836", "CSAFPID-2631835", "CSAFPID-2631900", "CSAFPID-2632341", "CSAFPID-2632342", "CSAFPID-2632343", "CSAFPID-2631790", "CSAFPID-2632460", "CSAFPID-2632459", "CSAFPID-2631854", "CSAFPID-2631855", "CSAFPID-2632083", "CSAFPID-1296722", "CSAFPID-2631923", "CSAFPID-1296723", "CSAFPID-2631924", "CSAFPID-2631925", "CSAFPID-2631926", "CSAFPID-2631927", "CSAFPID-2631928", "CSAFPID-2631929", "CSAFPID-2631932", "CSAFPID-2631933", "CSAFPID-2631934", "CSAFPID-2631935", "CSAFPID-1765658", "CSAFPID-1765659", "CSAFPID-2631856", "CSAFPID-2631858", "CSAFPID-2631860", "CSAFPID-2631862", "CSAFPID-1765660", "CSAFPID-2631936", "CSAFPID-2631937", "CSAFPID-2631938", "CSAFPID-2631939", "CSAFPID-2631940", "CSAFPID-2631920", "CSAFPID-2631921", "CSAFPID-2631922", "CSAFPID-2631967", "CSAFPID-2631968", "CSAFPID-2631969", "CSAFPID-2632004", "CSAFPID-2632005", "CSAFPID-2632006", "CSAFPID-2632007", "CSAFPID-2632008", "CSAFPID-2631966", "CSAFPID-1765690", "CSAFPID-1765691", "CSAFPID-2459039", "CSAFPID-2631970", "CSAFPID-2631971", "CSAFPID-2631972", "CSAFPID-2631973", "CSAFPID-2631974", "CSAFPID-2631975", "CSAFPID-1765700", "CSAFPID-1765701", "CSAFPID-2631976", "CSAFPID-2631977", "CSAFPID-1296980", "CSAFPID-2631978", "CSAFPID-2631979", "CSAFPID-2631980", "CSAFPID-2631981", "CSAFPID-2631982", "CSAFPID-2631983", "CSAFPID-2631984", "CSAFPID-2631985", "CSAFPID-2632402", "CSAFPID-2631802", "CSAFPID-2631803", "CSAFPID-2631804", "CSAFPID-2631805", "CSAFPID-1296837", "CSAFPID-2631806", "CSAFPID-1211926", "CSAFPID-2619361", "CSAFPID-1209122" ] } ], "title": "CVE-2024-41794" }, { "cve": "CVE-2024-41795", "cwe": { "id": "CWE-352", "name": "Cross-Site Request Forgery (CSRF)" }, "notes": [ { "category": "other", "text": "Cross-Site Request Forgery (CSRF)", "title": "CWE-352" }, { "category": "general", "text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N", "title": "CVSSV4" } ], "product_status": { "known_affected": [ "CSAFPID-2631845", "CSAFPID-2631844", "CSAFPID-2631843", "CSAFPID-2631842", "CSAFPID-2631841", "CSAFPID-2631840", "CSAFPID-2631839", "CSAFPID-2631838", "CSAFPID-2631837", "CSAFPID-2631836", "CSAFPID-2631835", "CSAFPID-2631900", "CSAFPID-2632341", "CSAFPID-2632342", "CSAFPID-2632343", "CSAFPID-2631790", "CSAFPID-2632460", "CSAFPID-2632459", "CSAFPID-2631854", "CSAFPID-2631855", "CSAFPID-2632083", "CSAFPID-1296722", "CSAFPID-2631923", "CSAFPID-1296723", "CSAFPID-2631924", "CSAFPID-2631925", "CSAFPID-2631926", "CSAFPID-2631927", "CSAFPID-2631928", "CSAFPID-2631929", "CSAFPID-2631932", "CSAFPID-2631933", "CSAFPID-2631934", "CSAFPID-2631935", "CSAFPID-1765658", "CSAFPID-1765659", "CSAFPID-2631856", "CSAFPID-2631858", "CSAFPID-2631860", "CSAFPID-2631862", "CSAFPID-1765660", "CSAFPID-2631936", "CSAFPID-2631937", "CSAFPID-2631938", "CSAFPID-2631939", "CSAFPID-2631940", "CSAFPID-2631920", "CSAFPID-2631921", "CSAFPID-2631922", "CSAFPID-2631967", "CSAFPID-2631968", "CSAFPID-2631969", "CSAFPID-2632004", "CSAFPID-2632005", "CSAFPID-2632006", "CSAFPID-2632007", "CSAFPID-2632008", "CSAFPID-2631966", "CSAFPID-1765690", "CSAFPID-1765691", "CSAFPID-2459039", "CSAFPID-2631970", "CSAFPID-2631971", "CSAFPID-2631972", "CSAFPID-2631973", "CSAFPID-2631974", "CSAFPID-2631975", "CSAFPID-1765700", "CSAFPID-1765701", "CSAFPID-2631976", "CSAFPID-2631977", "CSAFPID-1296980", "CSAFPID-2631978", "CSAFPID-2631979", "CSAFPID-2631980", "CSAFPID-2631981", "CSAFPID-2631982", "CSAFPID-2631983", "CSAFPID-2631984", "CSAFPID-2631985", "CSAFPID-2632402", "CSAFPID-2631802", "CSAFPID-2631803", "CSAFPID-2631804", "CSAFPID-2631805", "CSAFPID-1296837", "CSAFPID-2631806", "CSAFPID-1211926", "CSAFPID-2619361", "CSAFPID-1209122" ] }, "references": [ { "category": "self", "summary": "CVE-2024-41795", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-41795.json" } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-2631845", "CSAFPID-2631844", "CSAFPID-2631843", "CSAFPID-2631842", "CSAFPID-2631841", "CSAFPID-2631840", "CSAFPID-2631839", "CSAFPID-2631838", "CSAFPID-2631837", "CSAFPID-2631836", "CSAFPID-2631835", "CSAFPID-2631900", "CSAFPID-2632341", "CSAFPID-2632342", "CSAFPID-2632343", "CSAFPID-2631790", "CSAFPID-2632460", "CSAFPID-2632459", "CSAFPID-2631854", "CSAFPID-2631855", "CSAFPID-2632083", "CSAFPID-1296722", "CSAFPID-2631923", "CSAFPID-1296723", "CSAFPID-2631924", "CSAFPID-2631925", "CSAFPID-2631926", "CSAFPID-2631927", "CSAFPID-2631928", "CSAFPID-2631929", "CSAFPID-2631932", "CSAFPID-2631933", "CSAFPID-2631934", "CSAFPID-2631935", "CSAFPID-1765658", "CSAFPID-1765659", "CSAFPID-2631856", "CSAFPID-2631858", "CSAFPID-2631860", "CSAFPID-2631862", "CSAFPID-1765660", "CSAFPID-2631936", "CSAFPID-2631937", "CSAFPID-2631938", "CSAFPID-2631939", "CSAFPID-2631940", "CSAFPID-2631920", "CSAFPID-2631921", "CSAFPID-2631922", "CSAFPID-2631967", "CSAFPID-2631968", "CSAFPID-2631969", "CSAFPID-2632004", "CSAFPID-2632005", "CSAFPID-2632006", "CSAFPID-2632007", "CSAFPID-2632008", "CSAFPID-2631966", "CSAFPID-1765690", "CSAFPID-1765691", "CSAFPID-2459039", "CSAFPID-2631970", "CSAFPID-2631971", "CSAFPID-2631972", "CSAFPID-2631973", "CSAFPID-2631974", "CSAFPID-2631975", "CSAFPID-1765700", "CSAFPID-1765701", "CSAFPID-2631976", "CSAFPID-2631977", "CSAFPID-1296980", "CSAFPID-2631978", "CSAFPID-2631979", "CSAFPID-2631980", "CSAFPID-2631981", "CSAFPID-2631982", "CSAFPID-2631983", "CSAFPID-2631984", "CSAFPID-2631985", "CSAFPID-2632402", "CSAFPID-2631802", "CSAFPID-2631803", "CSAFPID-2631804", "CSAFPID-2631805", "CSAFPID-1296837", "CSAFPID-2631806", "CSAFPID-1211926", "CSAFPID-2619361", "CSAFPID-1209122" ] } ], "title": "CVE-2024-41795" }, { "cve": "CVE-2024-41796", "cwe": { "id": "CWE-620", "name": "Unverified Password Change" }, "notes": [ { "category": "other", "text": "Unverified Password Change", "title": "CWE-620" }, { "category": "general", "text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N", "title": "CVSSV4" } ], "product_status": { "known_affected": [ "CSAFPID-2631845", "CSAFPID-2631844", "CSAFPID-2631843", "CSAFPID-2631842", "CSAFPID-2631841", "CSAFPID-2631840", "CSAFPID-2631839", "CSAFPID-2631838", "CSAFPID-2631837", "CSAFPID-2631836", "CSAFPID-2631835", "CSAFPID-2631900", "CSAFPID-2632341", "CSAFPID-2632342", "CSAFPID-2632343", "CSAFPID-2631790", "CSAFPID-2632460", "CSAFPID-2632459", "CSAFPID-2631854", "CSAFPID-2631855", "CSAFPID-2632083", "CSAFPID-1296722", "CSAFPID-2631923", "CSAFPID-1296723", "CSAFPID-2631924", "CSAFPID-2631925", "CSAFPID-2631926", "CSAFPID-2631927", "CSAFPID-2631928", "CSAFPID-2631929", "CSAFPID-2631932", "CSAFPID-2631933", "CSAFPID-2631934", "CSAFPID-2631935", "CSAFPID-1765658", "CSAFPID-1765659", "CSAFPID-2631856", "CSAFPID-2631858", "CSAFPID-2631860", "CSAFPID-2631862", "CSAFPID-1765660", "CSAFPID-2631936", "CSAFPID-2631937", "CSAFPID-2631938", "CSAFPID-2631939", "CSAFPID-2631940", "CSAFPID-2631920", "CSAFPID-2631921", "CSAFPID-2631922", "CSAFPID-2631967", "CSAFPID-2631968", "CSAFPID-2631969", "CSAFPID-2632004", "CSAFPID-2632005", "CSAFPID-2632006", "CSAFPID-2632007", "CSAFPID-2632008", "CSAFPID-2631966", "CSAFPID-1765690", "CSAFPID-1765691", "CSAFPID-2459039", "CSAFPID-2631970", "CSAFPID-2631971", "CSAFPID-2631972", "CSAFPID-2631973", "CSAFPID-2631974", "CSAFPID-2631975", "CSAFPID-1765700", "CSAFPID-1765701", "CSAFPID-2631976", "CSAFPID-2631977", "CSAFPID-1296980", "CSAFPID-2631978", "CSAFPID-2631979", "CSAFPID-2631980", "CSAFPID-2631981", "CSAFPID-2631982", "CSAFPID-2631983", "CSAFPID-2631984", "CSAFPID-2631985", "CSAFPID-2632402", "CSAFPID-2631802", "CSAFPID-2631803", "CSAFPID-2631804", "CSAFPID-2631805", "CSAFPID-1296837", "CSAFPID-2631806", "CSAFPID-1211926", "CSAFPID-2619361", "CSAFPID-1209122" ] }, "references": [ { "category": "self", "summary": "CVE-2024-41796", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-41796.json" } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-2631845", "CSAFPID-2631844", "CSAFPID-2631843", "CSAFPID-2631842", "CSAFPID-2631841", "CSAFPID-2631840", "CSAFPID-2631839", "CSAFPID-2631838", "CSAFPID-2631837", "CSAFPID-2631836", "CSAFPID-2631835", "CSAFPID-2631900", "CSAFPID-2632341", "CSAFPID-2632342", "CSAFPID-2632343", "CSAFPID-2631790", "CSAFPID-2632460", "CSAFPID-2632459", "CSAFPID-2631854", "CSAFPID-2631855", "CSAFPID-2632083", "CSAFPID-1296722", "CSAFPID-2631923", "CSAFPID-1296723", "CSAFPID-2631924", "CSAFPID-2631925", "CSAFPID-2631926", "CSAFPID-2631927", "CSAFPID-2631928", "CSAFPID-2631929", "CSAFPID-2631932", "CSAFPID-2631933", "CSAFPID-2631934", "CSAFPID-2631935", "CSAFPID-1765658", "CSAFPID-1765659", "CSAFPID-2631856", "CSAFPID-2631858", "CSAFPID-2631860", "CSAFPID-2631862", "CSAFPID-1765660", "CSAFPID-2631936", "CSAFPID-2631937", "CSAFPID-2631938", "CSAFPID-2631939", "CSAFPID-2631940", "CSAFPID-2631920", "CSAFPID-2631921", "CSAFPID-2631922", "CSAFPID-2631967", "CSAFPID-2631968", "CSAFPID-2631969", "CSAFPID-2632004", "CSAFPID-2632005", "CSAFPID-2632006", "CSAFPID-2632007", "CSAFPID-2632008", "CSAFPID-2631966", "CSAFPID-1765690", "CSAFPID-1765691", "CSAFPID-2459039", "CSAFPID-2631970", "CSAFPID-2631971", "CSAFPID-2631972", "CSAFPID-2631973", "CSAFPID-2631974", "CSAFPID-2631975", "CSAFPID-1765700", "CSAFPID-1765701", "CSAFPID-2631976", "CSAFPID-2631977", "CSAFPID-1296980", "CSAFPID-2631978", "CSAFPID-2631979", "CSAFPID-2631980", "CSAFPID-2631981", "CSAFPID-2631982", "CSAFPID-2631983", "CSAFPID-2631984", "CSAFPID-2631985", "CSAFPID-2632402", "CSAFPID-2631802", "CSAFPID-2631803", "CSAFPID-2631804", "CSAFPID-2631805", "CSAFPID-1296837", "CSAFPID-2631806", "CSAFPID-1211926", "CSAFPID-2619361", "CSAFPID-1209122" ] } ], "title": "CVE-2024-41796" }, { "cve": "CVE-2024-54091", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "other", "text": "Out-of-bounds Write", "title": "CWE-787" }, { "category": "general", "text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N", "title": "CVSSV4" } ], "product_status": { "known_affected": [ "CSAFPID-2631845", "CSAFPID-2631844", "CSAFPID-2631843", "CSAFPID-2631842", "CSAFPID-2631841", "CSAFPID-2631840", "CSAFPID-2631839", "CSAFPID-2631838", "CSAFPID-2631837", "CSAFPID-2631836", "CSAFPID-2631835", "CSAFPID-2631900", "CSAFPID-2632341", "CSAFPID-2632342", "CSAFPID-2632343", "CSAFPID-2631790", "CSAFPID-2632460", "CSAFPID-2632459", "CSAFPID-2631854", "CSAFPID-2631855", "CSAFPID-2632083", "CSAFPID-1296722", "CSAFPID-2631923", "CSAFPID-1296723", "CSAFPID-2631924", "CSAFPID-2631925", "CSAFPID-2631926", "CSAFPID-2631927", "CSAFPID-2631928", "CSAFPID-2631929", "CSAFPID-2631932", "CSAFPID-2631933", "CSAFPID-2631934", "CSAFPID-2631935", "CSAFPID-1765658", "CSAFPID-1765659", "CSAFPID-2631856", "CSAFPID-2631858", "CSAFPID-2631860", "CSAFPID-2631862", "CSAFPID-1765660", "CSAFPID-2631936", "CSAFPID-2631937", "CSAFPID-2631938", "CSAFPID-2631939", "CSAFPID-2631940", "CSAFPID-2631920", "CSAFPID-2631921", "CSAFPID-2631922", "CSAFPID-2631967", "CSAFPID-2631968", "CSAFPID-2631969", "CSAFPID-2632004", "CSAFPID-2632005", "CSAFPID-2632006", "CSAFPID-2632007", "CSAFPID-2632008", "CSAFPID-2631966", "CSAFPID-1765690", "CSAFPID-1765691", "CSAFPID-2459039", "CSAFPID-2631970", "CSAFPID-2631971", "CSAFPID-2631972", "CSAFPID-2631973", "CSAFPID-2631974", "CSAFPID-2631975", "CSAFPID-1765700", "CSAFPID-1765701", "CSAFPID-2631976", "CSAFPID-2631977", "CSAFPID-1296980", "CSAFPID-2631978", "CSAFPID-2631979", "CSAFPID-2631980", "CSAFPID-2631981", "CSAFPID-2631982", "CSAFPID-2631983", "CSAFPID-2631984", "CSAFPID-2631985", "CSAFPID-2632402", "CSAFPID-2631802", "CSAFPID-2631803", "CSAFPID-2631804", "CSAFPID-2631805", "CSAFPID-1296837", "CSAFPID-2631806", "CSAFPID-1211926", "CSAFPID-2619361", "CSAFPID-1209122" ] }, "references": [ { "category": "self", "summary": "CVE-2024-54091", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-54091.json" } ], "title": "CVE-2024-54091" }, { "cve": "CVE-2024-54092", "cwe": { "id": "CWE-1390", "name": "Weak Authentication" }, "notes": [ { "category": "other", "text": "Weak Authentication", "title": "CWE-1390" }, { "category": "general", "text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N", "title": "CVSSV4" } ], "product_status": { "known_affected": [ "CSAFPID-2631845", "CSAFPID-2631844", "CSAFPID-2631843", "CSAFPID-2631842", "CSAFPID-2631841", "CSAFPID-2631840", "CSAFPID-2631839", "CSAFPID-2631838", "CSAFPID-2631837", "CSAFPID-2631836", "CSAFPID-2631835", "CSAFPID-2631900", "CSAFPID-2632341", "CSAFPID-2632342", "CSAFPID-2632343", "CSAFPID-2631790", "CSAFPID-2632460", "CSAFPID-2632459", "CSAFPID-2631854", "CSAFPID-2631855", "CSAFPID-2632083", "CSAFPID-1296722", "CSAFPID-2631923", "CSAFPID-1296723", "CSAFPID-2631924", "CSAFPID-2631925", "CSAFPID-2631926", "CSAFPID-2631927", "CSAFPID-2631928", "CSAFPID-2631929", "CSAFPID-2631932", "CSAFPID-2631933", "CSAFPID-2631934", "CSAFPID-2631935", "CSAFPID-1765658", "CSAFPID-1765659", "CSAFPID-2631856", "CSAFPID-2631858", "CSAFPID-2631860", "CSAFPID-2631862", "CSAFPID-1765660", "CSAFPID-2631936", "CSAFPID-2631937", "CSAFPID-2631938", "CSAFPID-2631939", "CSAFPID-2631940", "CSAFPID-2631920", "CSAFPID-2631921", "CSAFPID-2631922", "CSAFPID-2631967", "CSAFPID-2631968", "CSAFPID-2631969", "CSAFPID-2632004", "CSAFPID-2632005", "CSAFPID-2632006", "CSAFPID-2632007", "CSAFPID-2632008", "CSAFPID-2631966", "CSAFPID-1765690", "CSAFPID-1765691", "CSAFPID-2459039", "CSAFPID-2631970", "CSAFPID-2631971", "CSAFPID-2631972", "CSAFPID-2631973", "CSAFPID-2631974", "CSAFPID-2631975", "CSAFPID-1765700", "CSAFPID-1765701", "CSAFPID-2631976", "CSAFPID-2631977", "CSAFPID-1296980", "CSAFPID-2631978", "CSAFPID-2631979", "CSAFPID-2631980", "CSAFPID-2631981", "CSAFPID-2631982", "CSAFPID-2631983", "CSAFPID-2631984", "CSAFPID-2631985", "CSAFPID-2632402", "CSAFPID-2631802", "CSAFPID-2631803", "CSAFPID-2631804", "CSAFPID-2631805", "CSAFPID-1296837", "CSAFPID-2631806", "CSAFPID-1211926", "CSAFPID-2619361", "CSAFPID-1209122" ] }, "references": [ { "category": "self", "summary": "CVE-2024-54092", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-54092.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-2631845", "CSAFPID-2631844", "CSAFPID-2631843", "CSAFPID-2631842", "CSAFPID-2631841", "CSAFPID-2631840", "CSAFPID-2631839", "CSAFPID-2631838", "CSAFPID-2631837", "CSAFPID-2631836", "CSAFPID-2631835", "CSAFPID-2631900", "CSAFPID-2632341", "CSAFPID-2632342", "CSAFPID-2632343", "CSAFPID-2631790", "CSAFPID-2632460", "CSAFPID-2632459", "CSAFPID-2631854", "CSAFPID-2631855", "CSAFPID-2632083", "CSAFPID-1296722", "CSAFPID-2631923", "CSAFPID-1296723", "CSAFPID-2631924", "CSAFPID-2631925", "CSAFPID-2631926", "CSAFPID-2631927", "CSAFPID-2631928", "CSAFPID-2631929", "CSAFPID-2631932", "CSAFPID-2631933", "CSAFPID-2631934", "CSAFPID-2631935", "CSAFPID-1765658", "CSAFPID-1765659", "CSAFPID-2631856", "CSAFPID-2631858", "CSAFPID-2631860", "CSAFPID-2631862", "CSAFPID-1765660", "CSAFPID-2631936", "CSAFPID-2631937", "CSAFPID-2631938", "CSAFPID-2631939", "CSAFPID-2631940", "CSAFPID-2631920", "CSAFPID-2631921", "CSAFPID-2631922", "CSAFPID-2631967", "CSAFPID-2631968", "CSAFPID-2631969", "CSAFPID-2632004", "CSAFPID-2632005", "CSAFPID-2632006", "CSAFPID-2632007", "CSAFPID-2632008", "CSAFPID-2631966", "CSAFPID-1765690", "CSAFPID-1765691", "CSAFPID-2459039", "CSAFPID-2631970", "CSAFPID-2631971", "CSAFPID-2631972", "CSAFPID-2631973", "CSAFPID-2631974", "CSAFPID-2631975", "CSAFPID-1765700", "CSAFPID-1765701", "CSAFPID-2631976", "CSAFPID-2631977", "CSAFPID-1296980", "CSAFPID-2631978", "CSAFPID-2631979", "CSAFPID-2631980", "CSAFPID-2631981", "CSAFPID-2631982", "CSAFPID-2631983", "CSAFPID-2631984", "CSAFPID-2631985", "CSAFPID-2632402", "CSAFPID-2631802", "CSAFPID-2631803", "CSAFPID-2631804", "CSAFPID-2631805", "CSAFPID-1296837", "CSAFPID-2631806", "CSAFPID-1211926", "CSAFPID-2619361", "CSAFPID-1209122" ] } ], "title": "CVE-2024-54092" }, { "cve": "CVE-2025-30280", "cwe": { "id": "CWE-204", "name": "Observable Response Discrepancy" }, "notes": [ { "category": "other", "text": "Observable Response Discrepancy", "title": "CWE-204" }, { "category": "general", "text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N", "title": "CVSSV4" } ], "product_status": { "known_affected": [ "CSAFPID-2631845", "CSAFPID-2631844", "CSAFPID-2631843", "CSAFPID-2631842", "CSAFPID-2631841", "CSAFPID-2631840", "CSAFPID-2631839", "CSAFPID-2631838", "CSAFPID-2631837", "CSAFPID-2631836", "CSAFPID-2631835", "CSAFPID-2631900", "CSAFPID-2632341", "CSAFPID-2632342", "CSAFPID-2632343", "CSAFPID-2631790", "CSAFPID-2632460", "CSAFPID-2632459", "CSAFPID-2631854", "CSAFPID-2631855", "CSAFPID-2632083", "CSAFPID-1296722", "CSAFPID-2631923", "CSAFPID-1296723", "CSAFPID-2631924", "CSAFPID-2631925", "CSAFPID-2631926", "CSAFPID-2631927", "CSAFPID-2631928", "CSAFPID-2631929", "CSAFPID-2631932", "CSAFPID-2631933", "CSAFPID-2631934", "CSAFPID-2631935", "CSAFPID-1765658", "CSAFPID-1765659", "CSAFPID-2631856", "CSAFPID-2631858", "CSAFPID-2631860", "CSAFPID-2631862", "CSAFPID-1765660", "CSAFPID-2631936", "CSAFPID-2631937", "CSAFPID-2631938", "CSAFPID-2631939", "CSAFPID-2631940", "CSAFPID-2631920", "CSAFPID-2631921", "CSAFPID-2631922", "CSAFPID-2631967", "CSAFPID-2631968", "CSAFPID-2631969", "CSAFPID-2632004", "CSAFPID-2632005", "CSAFPID-2632006", "CSAFPID-2632007", "CSAFPID-2632008", "CSAFPID-2631966", "CSAFPID-1765690", "CSAFPID-1765691", "CSAFPID-2459039", "CSAFPID-2631970", "CSAFPID-2631971", "CSAFPID-2631972", "CSAFPID-2631973", "CSAFPID-2631974", "CSAFPID-2631975", "CSAFPID-1765700", "CSAFPID-1765701", "CSAFPID-2631976", "CSAFPID-2631977", "CSAFPID-1296980", "CSAFPID-2631978", "CSAFPID-2631979", "CSAFPID-2631980", "CSAFPID-2631981", "CSAFPID-2631982", "CSAFPID-2631983", "CSAFPID-2631984", "CSAFPID-2631985", "CSAFPID-2632402", "CSAFPID-2631802", "CSAFPID-2631803", "CSAFPID-2631804", "CSAFPID-2631805", "CSAFPID-1296837", "CSAFPID-2631806", "CSAFPID-1211926", "CSAFPID-2619361", "CSAFPID-1209122" ] }, "references": [ { "category": "self", "summary": "CVE-2025-30280", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-30280.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-2631845", "CSAFPID-2631844", "CSAFPID-2631843", "CSAFPID-2631842", "CSAFPID-2631841", "CSAFPID-2631840", "CSAFPID-2631839", "CSAFPID-2631838", "CSAFPID-2631837", "CSAFPID-2631836", "CSAFPID-2631835", "CSAFPID-2631900", "CSAFPID-2632341", "CSAFPID-2632342", "CSAFPID-2632343", "CSAFPID-2631790", "CSAFPID-2632460", "CSAFPID-2632459", "CSAFPID-2631854", "CSAFPID-2631855", "CSAFPID-2632083", "CSAFPID-1296722", "CSAFPID-2631923", "CSAFPID-1296723", "CSAFPID-2631924", "CSAFPID-2631925", "CSAFPID-2631926", "CSAFPID-2631927", "CSAFPID-2631928", "CSAFPID-2631929", "CSAFPID-2631932", "CSAFPID-2631933", "CSAFPID-2631934", "CSAFPID-2631935", "CSAFPID-1765658", "CSAFPID-1765659", "CSAFPID-2631856", "CSAFPID-2631858", "CSAFPID-2631860", "CSAFPID-2631862", "CSAFPID-1765660", "CSAFPID-2631936", "CSAFPID-2631937", "CSAFPID-2631938", "CSAFPID-2631939", "CSAFPID-2631940", "CSAFPID-2631920", "CSAFPID-2631921", "CSAFPID-2631922", "CSAFPID-2631967", "CSAFPID-2631968", "CSAFPID-2631969", "CSAFPID-2632004", "CSAFPID-2632005", "CSAFPID-2632006", "CSAFPID-2632007", "CSAFPID-2632008", "CSAFPID-2631966", "CSAFPID-1765690", "CSAFPID-1765691", "CSAFPID-2459039", "CSAFPID-2631970", "CSAFPID-2631971", "CSAFPID-2631972", "CSAFPID-2631973", "CSAFPID-2631974", "CSAFPID-2631975", "CSAFPID-1765700", "CSAFPID-1765701", "CSAFPID-2631976", "CSAFPID-2631977", "CSAFPID-1296980", "CSAFPID-2631978", "CSAFPID-2631979", "CSAFPID-2631980", "CSAFPID-2631981", "CSAFPID-2631982", "CSAFPID-2631983", "CSAFPID-2631984", "CSAFPID-2631985", "CSAFPID-2632402", "CSAFPID-2631802", "CSAFPID-2631803", "CSAFPID-2631804", "CSAFPID-2631805", "CSAFPID-1296837", "CSAFPID-2631806", "CSAFPID-1211926", "CSAFPID-2619361", "CSAFPID-1209122" ] } ], "title": "CVE-2025-30280" }, { "cve": "CVE-2025-1097", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" }, { "category": "other", "text": "External Control of System or Configuration Setting", "title": "CWE-15" } ], "product_status": { "known_affected": [ "CSAFPID-2631845", "CSAFPID-2631844", "CSAFPID-2631843", "CSAFPID-2631842", "CSAFPID-2631841", "CSAFPID-2631840", "CSAFPID-2631839", "CSAFPID-2631838", "CSAFPID-2631837", "CSAFPID-2631836", "CSAFPID-2631835", "CSAFPID-2631900", "CSAFPID-2632341", "CSAFPID-2632342", "CSAFPID-2632343", "CSAFPID-2631790", "CSAFPID-2632460", "CSAFPID-2632459", "CSAFPID-2631854", "CSAFPID-2631855", "CSAFPID-2632083", "CSAFPID-1296722", "CSAFPID-2631923", "CSAFPID-1296723", "CSAFPID-2631924", "CSAFPID-2631925", "CSAFPID-2631926", "CSAFPID-2631927", "CSAFPID-2631928", "CSAFPID-2631929", "CSAFPID-2631932", "CSAFPID-2631933", "CSAFPID-2631934", "CSAFPID-2631935", "CSAFPID-1765658", "CSAFPID-1765659", "CSAFPID-2631856", "CSAFPID-2631858", "CSAFPID-2631860", "CSAFPID-2631862", "CSAFPID-1765660", "CSAFPID-2631936", "CSAFPID-2631937", "CSAFPID-2631938", "CSAFPID-2631939", "CSAFPID-2631940", "CSAFPID-2631920", "CSAFPID-2631921", "CSAFPID-2631922", "CSAFPID-2631967", "CSAFPID-2631968", "CSAFPID-2631969", "CSAFPID-2632004", "CSAFPID-2632005", "CSAFPID-2632006", "CSAFPID-2632007", "CSAFPID-2632008", "CSAFPID-2631966", "CSAFPID-1765690", "CSAFPID-1765691", "CSAFPID-2459039", "CSAFPID-2631970", "CSAFPID-2631971", "CSAFPID-2631972", "CSAFPID-2631973", "CSAFPID-2631974", "CSAFPID-2631975", "CSAFPID-1765700", "CSAFPID-1765701", "CSAFPID-2631976", "CSAFPID-2631977", "CSAFPID-1296980", "CSAFPID-2631978", "CSAFPID-2631979", "CSAFPID-2631980", "CSAFPID-2631981", "CSAFPID-2631982", "CSAFPID-2631983", "CSAFPID-2631984", "CSAFPID-2631985", "CSAFPID-2632402", "CSAFPID-2631802", "CSAFPID-2631803", "CSAFPID-2631804", "CSAFPID-2631805", "CSAFPID-1296837", "CSAFPID-2631806", "CSAFPID-1211926", "CSAFPID-2619361", "CSAFPID-1209122" ] }, "references": [ { "category": "self", "summary": "CVE-2025-1097", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-1097.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-2631845", "CSAFPID-2631844", "CSAFPID-2631843", "CSAFPID-2631842", "CSAFPID-2631841", "CSAFPID-2631840", "CSAFPID-2631839", "CSAFPID-2631838", "CSAFPID-2631837", "CSAFPID-2631836", "CSAFPID-2631835", "CSAFPID-2631900", "CSAFPID-2632341", "CSAFPID-2632342", "CSAFPID-2632343", "CSAFPID-2631790", "CSAFPID-2632460", "CSAFPID-2632459", "CSAFPID-2631854", "CSAFPID-2631855", "CSAFPID-2632083", "CSAFPID-1296722", "CSAFPID-2631923", "CSAFPID-1296723", "CSAFPID-2631924", "CSAFPID-2631925", "CSAFPID-2631926", "CSAFPID-2631927", "CSAFPID-2631928", "CSAFPID-2631929", "CSAFPID-2631932", "CSAFPID-2631933", "CSAFPID-2631934", "CSAFPID-2631935", "CSAFPID-1765658", "CSAFPID-1765659", "CSAFPID-2631856", "CSAFPID-2631858", "CSAFPID-2631860", "CSAFPID-2631862", "CSAFPID-1765660", "CSAFPID-2631936", "CSAFPID-2631937", "CSAFPID-2631938", "CSAFPID-2631939", "CSAFPID-2631940", "CSAFPID-2631920", "CSAFPID-2631921", "CSAFPID-2631922", "CSAFPID-2631967", "CSAFPID-2631968", "CSAFPID-2631969", "CSAFPID-2632004", "CSAFPID-2632005", "CSAFPID-2632006", "CSAFPID-2632007", "CSAFPID-2632008", "CSAFPID-2631966", "CSAFPID-1765690", "CSAFPID-1765691", "CSAFPID-2459039", "CSAFPID-2631970", "CSAFPID-2631971", "CSAFPID-2631972", "CSAFPID-2631973", "CSAFPID-2631974", "CSAFPID-2631975", "CSAFPID-1765700", "CSAFPID-1765701", "CSAFPID-2631976", "CSAFPID-2631977", "CSAFPID-1296980", "CSAFPID-2631978", "CSAFPID-2631979", "CSAFPID-2631980", "CSAFPID-2631981", "CSAFPID-2631982", "CSAFPID-2631983", "CSAFPID-2631984", "CSAFPID-2631985", "CSAFPID-2632402", "CSAFPID-2631802", "CSAFPID-2631803", "CSAFPID-2631804", "CSAFPID-2631805", "CSAFPID-1296837", "CSAFPID-2631806", "CSAFPID-1211926", "CSAFPID-2619361", "CSAFPID-1209122" ] } ], "title": "CVE-2025-1097" }, { "cve": "CVE-2025-24514", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" }, { "category": "other", "text": "External Control of System or Configuration Setting", "title": "CWE-15" } ], "product_status": { "known_affected": [ "CSAFPID-2631845", "CSAFPID-2631844", "CSAFPID-2631843", "CSAFPID-2631842", "CSAFPID-2631841", "CSAFPID-2631840", "CSAFPID-2631839", "CSAFPID-2631838", "CSAFPID-2631837", "CSAFPID-2631836", "CSAFPID-2631835", "CSAFPID-2631900", "CSAFPID-2632341", "CSAFPID-2632342", "CSAFPID-2632343", "CSAFPID-2631790", "CSAFPID-2632460", "CSAFPID-2632459", "CSAFPID-2631854", "CSAFPID-2631855", "CSAFPID-2632083", "CSAFPID-1296722", "CSAFPID-2631923", "CSAFPID-1296723", "CSAFPID-2631924", "CSAFPID-2631925", "CSAFPID-2631926", "CSAFPID-2631927", "CSAFPID-2631928", "CSAFPID-2631929", "CSAFPID-2631932", "CSAFPID-2631933", "CSAFPID-2631934", "CSAFPID-2631935", "CSAFPID-1765658", "CSAFPID-1765659", "CSAFPID-2631856", "CSAFPID-2631858", "CSAFPID-2631860", "CSAFPID-2631862", "CSAFPID-1765660", "CSAFPID-2631936", "CSAFPID-2631937", "CSAFPID-2631938", "CSAFPID-2631939", "CSAFPID-2631940", "CSAFPID-2631920", "CSAFPID-2631921", "CSAFPID-2631922", "CSAFPID-2631967", "CSAFPID-2631968", "CSAFPID-2631969", "CSAFPID-2632004", "CSAFPID-2632005", "CSAFPID-2632006", "CSAFPID-2632007", "CSAFPID-2632008", "CSAFPID-2631966", "CSAFPID-1765690", "CSAFPID-1765691", "CSAFPID-2459039", "CSAFPID-2631970", "CSAFPID-2631971", "CSAFPID-2631972", "CSAFPID-2631973", "CSAFPID-2631974", "CSAFPID-2631975", "CSAFPID-1765700", "CSAFPID-1765701", "CSAFPID-2631976", "CSAFPID-2631977", "CSAFPID-1296980", "CSAFPID-2631978", "CSAFPID-2631979", "CSAFPID-2631980", "CSAFPID-2631981", "CSAFPID-2631982", "CSAFPID-2631983", "CSAFPID-2631984", "CSAFPID-2631985", "CSAFPID-2632402", "CSAFPID-2631802", "CSAFPID-2631803", "CSAFPID-2631804", "CSAFPID-2631805", "CSAFPID-1296837", "CSAFPID-2631806", "CSAFPID-1211926", "CSAFPID-2619361", "CSAFPID-1209122" ] }, "references": [ { "category": "self", "summary": "CVE-2025-24514", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24514.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-2631845", "CSAFPID-2631844", "CSAFPID-2631843", "CSAFPID-2631842", "CSAFPID-2631841", "CSAFPID-2631840", "CSAFPID-2631839", "CSAFPID-2631838", "CSAFPID-2631837", "CSAFPID-2631836", "CSAFPID-2631835", "CSAFPID-2631900", "CSAFPID-2632341", "CSAFPID-2632342", "CSAFPID-2632343", "CSAFPID-2631790", "CSAFPID-2632460", "CSAFPID-2632459", "CSAFPID-2631854", "CSAFPID-2631855", "CSAFPID-2632083", "CSAFPID-1296722", "CSAFPID-2631923", "CSAFPID-1296723", "CSAFPID-2631924", "CSAFPID-2631925", "CSAFPID-2631926", "CSAFPID-2631927", "CSAFPID-2631928", "CSAFPID-2631929", "CSAFPID-2631932", "CSAFPID-2631933", "CSAFPID-2631934", "CSAFPID-2631935", "CSAFPID-1765658", "CSAFPID-1765659", "CSAFPID-2631856", "CSAFPID-2631858", "CSAFPID-2631860", "CSAFPID-2631862", "CSAFPID-1765660", "CSAFPID-2631936", "CSAFPID-2631937", "CSAFPID-2631938", "CSAFPID-2631939", "CSAFPID-2631940", "CSAFPID-2631920", "CSAFPID-2631921", "CSAFPID-2631922", "CSAFPID-2631967", "CSAFPID-2631968", "CSAFPID-2631969", "CSAFPID-2632004", "CSAFPID-2632005", "CSAFPID-2632006", "CSAFPID-2632007", "CSAFPID-2632008", "CSAFPID-2631966", "CSAFPID-1765690", "CSAFPID-1765691", "CSAFPID-2459039", "CSAFPID-2631970", "CSAFPID-2631971", "CSAFPID-2631972", "CSAFPID-2631973", "CSAFPID-2631974", "CSAFPID-2631975", "CSAFPID-1765700", "CSAFPID-1765701", "CSAFPID-2631976", "CSAFPID-2631977", "CSAFPID-1296980", "CSAFPID-2631978", "CSAFPID-2631979", "CSAFPID-2631980", "CSAFPID-2631981", "CSAFPID-2631982", "CSAFPID-2631983", "CSAFPID-2631984", "CSAFPID-2631985", "CSAFPID-2632402", "CSAFPID-2631802", "CSAFPID-2631803", "CSAFPID-2631804", "CSAFPID-2631805", "CSAFPID-1296837", "CSAFPID-2631806", "CSAFPID-1211926", "CSAFPID-2619361", "CSAFPID-1209122" ] } ], "title": "CVE-2025-24514" }, { "cve": "CVE-2025-24513", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" }, { "category": "other", "text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)", "title": "CWE-22" } ], "product_status": { "known_affected": [ "CSAFPID-2631845", "CSAFPID-2631844", "CSAFPID-2631843", "CSAFPID-2631842", "CSAFPID-2631841", "CSAFPID-2631840", "CSAFPID-2631839", "CSAFPID-2631838", "CSAFPID-2631837", "CSAFPID-2631836", "CSAFPID-2631835", "CSAFPID-2631900", "CSAFPID-2632341", "CSAFPID-2632342", "CSAFPID-2632343", "CSAFPID-2631790", "CSAFPID-2632460", "CSAFPID-2632459", "CSAFPID-2631854", "CSAFPID-2631855", "CSAFPID-2632083", "CSAFPID-1296722", "CSAFPID-2631923", "CSAFPID-1296723", "CSAFPID-2631924", "CSAFPID-2631925", "CSAFPID-2631926", "CSAFPID-2631927", "CSAFPID-2631928", "CSAFPID-2631929", "CSAFPID-2631932", "CSAFPID-2631933", "CSAFPID-2631934", "CSAFPID-2631935", "CSAFPID-1765658", "CSAFPID-1765659", "CSAFPID-2631856", "CSAFPID-2631858", "CSAFPID-2631860", "CSAFPID-2631862", "CSAFPID-1765660", "CSAFPID-2631936", "CSAFPID-2631937", "CSAFPID-2631938", "CSAFPID-2631939", "CSAFPID-2631940", "CSAFPID-2631920", "CSAFPID-2631921", "CSAFPID-2631922", "CSAFPID-2631967", "CSAFPID-2631968", "CSAFPID-2631969", "CSAFPID-2632004", "CSAFPID-2632005", "CSAFPID-2632006", "CSAFPID-2632007", "CSAFPID-2632008", "CSAFPID-2631966", "CSAFPID-1765690", "CSAFPID-1765691", "CSAFPID-2459039", "CSAFPID-2631970", "CSAFPID-2631971", "CSAFPID-2631972", "CSAFPID-2631973", "CSAFPID-2631974", "CSAFPID-2631975", "CSAFPID-1765700", "CSAFPID-1765701", "CSAFPID-2631976", "CSAFPID-2631977", "CSAFPID-1296980", "CSAFPID-2631978", "CSAFPID-2631979", "CSAFPID-2631980", "CSAFPID-2631981", "CSAFPID-2631982", "CSAFPID-2631983", "CSAFPID-2631984", "CSAFPID-2631985", "CSAFPID-2632402", "CSAFPID-2631802", "CSAFPID-2631803", "CSAFPID-2631804", "CSAFPID-2631805", "CSAFPID-1296837", "CSAFPID-2631806", "CSAFPID-1211926", "CSAFPID-2619361", "CSAFPID-1209122" ] }, "references": [ { "category": "self", "summary": "CVE-2025-24513", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24513.json" } ], "scores": [ { "cvss_v3": { "baseScore": 4.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L", "version": "3.1" }, "products": [ "CSAFPID-2631845", "CSAFPID-2631844", "CSAFPID-2631843", "CSAFPID-2631842", "CSAFPID-2631841", "CSAFPID-2631840", "CSAFPID-2631839", "CSAFPID-2631838", "CSAFPID-2631837", "CSAFPID-2631836", "CSAFPID-2631835", "CSAFPID-2631900", "CSAFPID-2632341", "CSAFPID-2632342", "CSAFPID-2632343", "CSAFPID-2631790", "CSAFPID-2632460", "CSAFPID-2632459", "CSAFPID-2631854", "CSAFPID-2631855", "CSAFPID-2632083", "CSAFPID-1296722", "CSAFPID-2631923", "CSAFPID-1296723", "CSAFPID-2631924", "CSAFPID-2631925", "CSAFPID-2631926", "CSAFPID-2631927", "CSAFPID-2631928", "CSAFPID-2631929", "CSAFPID-2631932", "CSAFPID-2631933", "CSAFPID-2631934", "CSAFPID-2631935", "CSAFPID-1765658", "CSAFPID-1765659", "CSAFPID-2631856", "CSAFPID-2631858", "CSAFPID-2631860", "CSAFPID-2631862", "CSAFPID-1765660", "CSAFPID-2631936", "CSAFPID-2631937", "CSAFPID-2631938", "CSAFPID-2631939", "CSAFPID-2631940", "CSAFPID-2631920", "CSAFPID-2631921", "CSAFPID-2631922", "CSAFPID-2631967", "CSAFPID-2631968", "CSAFPID-2631969", "CSAFPID-2632004", "CSAFPID-2632005", "CSAFPID-2632006", "CSAFPID-2632007", "CSAFPID-2632008", "CSAFPID-2631966", "CSAFPID-1765690", "CSAFPID-1765691", "CSAFPID-2459039", "CSAFPID-2631970", "CSAFPID-2631971", "CSAFPID-2631972", "CSAFPID-2631973", "CSAFPID-2631974", "CSAFPID-2631975", "CSAFPID-1765700", "CSAFPID-1765701", "CSAFPID-2631976", "CSAFPID-2631977", "CSAFPID-1296980", "CSAFPID-2631978", "CSAFPID-2631979", "CSAFPID-2631980", "CSAFPID-2631981", "CSAFPID-2631982", "CSAFPID-2631983", "CSAFPID-2631984", "CSAFPID-2631985", "CSAFPID-2632402", "CSAFPID-2631802", "CSAFPID-2631803", "CSAFPID-2631804", "CSAFPID-2631805", "CSAFPID-1296837", "CSAFPID-2631806", "CSAFPID-1211926", "CSAFPID-2619361", "CSAFPID-1209122" ] } ], "title": "CVE-2025-24513" }, { "cve": "CVE-2025-1974", "cwe": { "id": "CWE-653", "name": "Improper Isolation or Compartmentalization" }, "notes": [ { "category": "other", "text": "Improper Isolation or Compartmentalization", "title": "CWE-653" }, { "category": "other", "text": "Improper Control of Generation of Code (\u0027Code Injection\u0027)", "title": "CWE-94" } ], "product_status": { "known_affected": [ "CSAFPID-2631845", "CSAFPID-2631844", "CSAFPID-2631843", "CSAFPID-2631842", "CSAFPID-2631841", "CSAFPID-2631840", "CSAFPID-2631839", "CSAFPID-2631838", "CSAFPID-2631837", "CSAFPID-2631836", "CSAFPID-2631835", "CSAFPID-2631900", "CSAFPID-2632341", "CSAFPID-2632342", "CSAFPID-2632343", "CSAFPID-2631790", "CSAFPID-2632460", "CSAFPID-2632459", "CSAFPID-2631854", "CSAFPID-2631855", "CSAFPID-2632083", "CSAFPID-1296722", "CSAFPID-2631923", "CSAFPID-1296723", "CSAFPID-2631924", "CSAFPID-2631925", "CSAFPID-2631926", "CSAFPID-2631927", "CSAFPID-2631928", "CSAFPID-2631929", "CSAFPID-2631932", "CSAFPID-2631933", "CSAFPID-2631934", "CSAFPID-2631935", "CSAFPID-1765658", "CSAFPID-1765659", "CSAFPID-2631856", "CSAFPID-2631858", "CSAFPID-2631860", "CSAFPID-2631862", "CSAFPID-1765660", "CSAFPID-2631936", "CSAFPID-2631937", "CSAFPID-2631938", "CSAFPID-2631939", "CSAFPID-2631940", "CSAFPID-2631920", "CSAFPID-2631921", "CSAFPID-2631922", "CSAFPID-2631967", "CSAFPID-2631968", "CSAFPID-2631969", "CSAFPID-2632004", "CSAFPID-2632005", "CSAFPID-2632006", "CSAFPID-2632007", "CSAFPID-2632008", "CSAFPID-2631966", "CSAFPID-1765690", "CSAFPID-1765691", "CSAFPID-2459039", "CSAFPID-2631970", "CSAFPID-2631971", "CSAFPID-2631972", "CSAFPID-2631973", "CSAFPID-2631974", "CSAFPID-2631975", "CSAFPID-1765700", "CSAFPID-1765701", "CSAFPID-2631976", "CSAFPID-2631977", "CSAFPID-1296980", "CSAFPID-2631978", "CSAFPID-2631979", "CSAFPID-2631980", "CSAFPID-2631981", "CSAFPID-2631982", "CSAFPID-2631983", "CSAFPID-2631984", "CSAFPID-2631985", "CSAFPID-2632402", "CSAFPID-2631802", "CSAFPID-2631803", "CSAFPID-2631804", "CSAFPID-2631805", "CSAFPID-1296837", "CSAFPID-2631806", "CSAFPID-1211926", "CSAFPID-2619361", "CSAFPID-1209122" ] }, "references": [ { "category": "self", "summary": "CVE-2025-1974", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-1974.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-2631845", "CSAFPID-2631844", "CSAFPID-2631843", "CSAFPID-2631842", "CSAFPID-2631841", "CSAFPID-2631840", "CSAFPID-2631839", "CSAFPID-2631838", "CSAFPID-2631837", "CSAFPID-2631836", "CSAFPID-2631835", "CSAFPID-2631900", "CSAFPID-2632341", "CSAFPID-2632342", "CSAFPID-2632343", "CSAFPID-2631790", "CSAFPID-2632460", "CSAFPID-2632459", "CSAFPID-2631854", "CSAFPID-2631855", "CSAFPID-2632083", "CSAFPID-1296722", "CSAFPID-2631923", "CSAFPID-1296723", "CSAFPID-2631924", "CSAFPID-2631925", "CSAFPID-2631926", "CSAFPID-2631927", "CSAFPID-2631928", "CSAFPID-2631929", "CSAFPID-2631932", "CSAFPID-2631933", "CSAFPID-2631934", "CSAFPID-2631935", "CSAFPID-1765658", "CSAFPID-1765659", "CSAFPID-2631856", "CSAFPID-2631858", "CSAFPID-2631860", "CSAFPID-2631862", "CSAFPID-1765660", "CSAFPID-2631936", "CSAFPID-2631937", "CSAFPID-2631938", "CSAFPID-2631939", "CSAFPID-2631940", "CSAFPID-2631920", "CSAFPID-2631921", "CSAFPID-2631922", "CSAFPID-2631967", "CSAFPID-2631968", "CSAFPID-2631969", "CSAFPID-2632004", "CSAFPID-2632005", "CSAFPID-2632006", "CSAFPID-2632007", "CSAFPID-2632008", "CSAFPID-2631966", "CSAFPID-1765690", "CSAFPID-1765691", "CSAFPID-2459039", "CSAFPID-2631970", "CSAFPID-2631971", "CSAFPID-2631972", "CSAFPID-2631973", "CSAFPID-2631974", "CSAFPID-2631975", "CSAFPID-1765700", "CSAFPID-1765701", "CSAFPID-2631976", "CSAFPID-2631977", "CSAFPID-1296980", "CSAFPID-2631978", "CSAFPID-2631979", "CSAFPID-2631980", "CSAFPID-2631981", "CSAFPID-2631982", "CSAFPID-2631983", "CSAFPID-2631984", "CSAFPID-2631985", "CSAFPID-2632402", "CSAFPID-2631802", "CSAFPID-2631803", "CSAFPID-2631804", "CSAFPID-2631805", "CSAFPID-1296837", "CSAFPID-2631806", "CSAFPID-1211926", "CSAFPID-2619361", "CSAFPID-1209122" ] } ], "title": "CVE-2025-1974" }, { "cve": "CVE-2025-1098", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" }, { "category": "other", "text": "External Control of System or Configuration Setting", "title": "CWE-15" } ], "product_status": { "known_affected": [ "CSAFPID-2631845", "CSAFPID-2631844", "CSAFPID-2631843", "CSAFPID-2631842", "CSAFPID-2631841", "CSAFPID-2631840", "CSAFPID-2631839", "CSAFPID-2631838", "CSAFPID-2631837", "CSAFPID-2631836", "CSAFPID-2631835", "CSAFPID-2631900", "CSAFPID-2632341", "CSAFPID-2632342", "CSAFPID-2632343", "CSAFPID-2631790", "CSAFPID-2632460", "CSAFPID-2632459", "CSAFPID-2631854", "CSAFPID-2631855", "CSAFPID-2632083", "CSAFPID-1296722", "CSAFPID-2631923", "CSAFPID-1296723", "CSAFPID-2631924", "CSAFPID-2631925", "CSAFPID-2631926", "CSAFPID-2631927", "CSAFPID-2631928", "CSAFPID-2631929", "CSAFPID-2631932", "CSAFPID-2631933", "CSAFPID-2631934", "CSAFPID-2631935", "CSAFPID-1765658", "CSAFPID-1765659", "CSAFPID-2631856", "CSAFPID-2631858", "CSAFPID-2631860", "CSAFPID-2631862", "CSAFPID-1765660", "CSAFPID-2631936", "CSAFPID-2631937", "CSAFPID-2631938", "CSAFPID-2631939", "CSAFPID-2631940", "CSAFPID-2631920", "CSAFPID-2631921", "CSAFPID-2631922", "CSAFPID-2631967", "CSAFPID-2631968", "CSAFPID-2631969", "CSAFPID-2632004", "CSAFPID-2632005", "CSAFPID-2632006", "CSAFPID-2632007", "CSAFPID-2632008", "CSAFPID-2631966", "CSAFPID-1765690", "CSAFPID-1765691", "CSAFPID-2459039", "CSAFPID-2631970", "CSAFPID-2631971", "CSAFPID-2631972", "CSAFPID-2631973", "CSAFPID-2631974", "CSAFPID-2631975", "CSAFPID-1765700", "CSAFPID-1765701", "CSAFPID-2631976", "CSAFPID-2631977", "CSAFPID-1296980", "CSAFPID-2631978", "CSAFPID-2631979", "CSAFPID-2631980", "CSAFPID-2631981", "CSAFPID-2631982", "CSAFPID-2631983", "CSAFPID-2631984", "CSAFPID-2631985", "CSAFPID-2632402", "CSAFPID-2631802", "CSAFPID-2631803", "CSAFPID-2631804", "CSAFPID-2631805", "CSAFPID-1296837", "CSAFPID-2631806", "CSAFPID-1211926", "CSAFPID-2619361", "CSAFPID-1209122" ] }, "references": [ { "category": "self", "summary": "CVE-2025-1098", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-1098.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-2631845", "CSAFPID-2631844", "CSAFPID-2631843", "CSAFPID-2631842", "CSAFPID-2631841", "CSAFPID-2631840", "CSAFPID-2631839", "CSAFPID-2631838", "CSAFPID-2631837", "CSAFPID-2631836", "CSAFPID-2631835", "CSAFPID-2631900", "CSAFPID-2632341", "CSAFPID-2632342", "CSAFPID-2632343", "CSAFPID-2631790", "CSAFPID-2632460", "CSAFPID-2632459", "CSAFPID-2631854", "CSAFPID-2631855", "CSAFPID-2632083", "CSAFPID-1296722", "CSAFPID-2631923", "CSAFPID-1296723", "CSAFPID-2631924", "CSAFPID-2631925", "CSAFPID-2631926", "CSAFPID-2631927", "CSAFPID-2631928", "CSAFPID-2631929", "CSAFPID-2631932", "CSAFPID-2631933", "CSAFPID-2631934", "CSAFPID-2631935", "CSAFPID-1765658", "CSAFPID-1765659", "CSAFPID-2631856", "CSAFPID-2631858", "CSAFPID-2631860", "CSAFPID-2631862", "CSAFPID-1765660", "CSAFPID-2631936", "CSAFPID-2631937", "CSAFPID-2631938", "CSAFPID-2631939", "CSAFPID-2631940", "CSAFPID-2631920", "CSAFPID-2631921", "CSAFPID-2631922", "CSAFPID-2631967", "CSAFPID-2631968", "CSAFPID-2631969", "CSAFPID-2632004", "CSAFPID-2632005", "CSAFPID-2632006", "CSAFPID-2632007", "CSAFPID-2632008", "CSAFPID-2631966", "CSAFPID-1765690", "CSAFPID-1765691", "CSAFPID-2459039", "CSAFPID-2631970", "CSAFPID-2631971", "CSAFPID-2631972", "CSAFPID-2631973", "CSAFPID-2631974", "CSAFPID-2631975", "CSAFPID-1765700", "CSAFPID-1765701", "CSAFPID-2631976", "CSAFPID-2631977", "CSAFPID-1296980", "CSAFPID-2631978", "CSAFPID-2631979", "CSAFPID-2631980", "CSAFPID-2631981", "CSAFPID-2631982", "CSAFPID-2631983", "CSAFPID-2631984", "CSAFPID-2631985", "CSAFPID-2632402", "CSAFPID-2631802", "CSAFPID-2631803", "CSAFPID-2631804", "CSAFPID-2631805", "CSAFPID-1296837", "CSAFPID-2631806", "CSAFPID-1211926", "CSAFPID-2619361", "CSAFPID-1209122" ] } ], "title": "CVE-2025-1098" }, { "cve": "CVE-2025-29999", "cwe": { "id": "CWE-269", "name": "Improper Privilege Management" }, "notes": [ { "category": "other", "text": "Improper Privilege Management", "title": "CWE-269" }, { "category": "general", "text": "CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N", "title": "CVSSV4" } ], "product_status": { "known_affected": [ "CSAFPID-2631845", "CSAFPID-2631844", "CSAFPID-2631843", "CSAFPID-2631842", "CSAFPID-2631841", "CSAFPID-2631840", "CSAFPID-2631839", "CSAFPID-2631838", "CSAFPID-2631837", "CSAFPID-2631836", "CSAFPID-2631835", "CSAFPID-2631900", "CSAFPID-2632341", "CSAFPID-2632342", "CSAFPID-2632343", "CSAFPID-2631790", "CSAFPID-2632460", "CSAFPID-2632459", "CSAFPID-2631854", "CSAFPID-2631855", "CSAFPID-2632083", "CSAFPID-1296722", "CSAFPID-2631923", "CSAFPID-1296723", "CSAFPID-2631924", "CSAFPID-2631925", "CSAFPID-2631926", "CSAFPID-2631927", "CSAFPID-2631928", "CSAFPID-2631929", "CSAFPID-2631932", "CSAFPID-2631933", "CSAFPID-2631934", "CSAFPID-2631935", "CSAFPID-1765658", "CSAFPID-1765659", "CSAFPID-2631856", "CSAFPID-2631858", "CSAFPID-2631860", "CSAFPID-2631862", "CSAFPID-1765660", "CSAFPID-2631936", "CSAFPID-2631937", "CSAFPID-2631938", "CSAFPID-2631939", "CSAFPID-2631940", "CSAFPID-2631920", "CSAFPID-2631921", "CSAFPID-2631922", "CSAFPID-2631967", "CSAFPID-2631968", "CSAFPID-2631969", "CSAFPID-2632004", "CSAFPID-2632005", "CSAFPID-2632006", "CSAFPID-2632007", "CSAFPID-2632008", "CSAFPID-2631966", "CSAFPID-1765690", "CSAFPID-1765691", "CSAFPID-2459039", "CSAFPID-2631970", "CSAFPID-2631971", "CSAFPID-2631972", "CSAFPID-2631973", "CSAFPID-2631974", "CSAFPID-2631975", "CSAFPID-1765700", "CSAFPID-1765701", "CSAFPID-2631976", "CSAFPID-2631977", "CSAFPID-1296980", "CSAFPID-2631978", "CSAFPID-2631979", "CSAFPID-2631980", "CSAFPID-2631981", "CSAFPID-2631982", "CSAFPID-2631983", "CSAFPID-2631984", "CSAFPID-2631985", "CSAFPID-2632402", "CSAFPID-2631802", "CSAFPID-2631803", "CSAFPID-2631804", "CSAFPID-2631805", "CSAFPID-1296837", "CSAFPID-2631806", "CSAFPID-1211926", "CSAFPID-2619361", "CSAFPID-1209122" ] }, "references": [ { "category": "self", "summary": "CVE-2025-29999", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-29999.json" } ], "title": "CVE-2025-29999" }, { "cve": "CVE-2025-30000", "cwe": { "id": "CWE-295", "name": "Improper Certificate Validation" }, "notes": [ { "category": "other", "text": "Improper Certificate Validation", "title": "CWE-295" }, { "category": "general", "text": "CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N", "title": "CVSSV4" } ], "product_status": { "known_affected": [ "CSAFPID-2631845", "CSAFPID-2631844", "CSAFPID-2631843", "CSAFPID-2631842", "CSAFPID-2631841", "CSAFPID-2631840", "CSAFPID-2631839", "CSAFPID-2631838", "CSAFPID-2631837", "CSAFPID-2631836", "CSAFPID-2631835", "CSAFPID-2631900", "CSAFPID-2632341", "CSAFPID-2632342", "CSAFPID-2632343", "CSAFPID-2631790", "CSAFPID-2632460", "CSAFPID-2632459", "CSAFPID-2631854", "CSAFPID-2631855", "CSAFPID-2632083", "CSAFPID-1296722", "CSAFPID-2631923", "CSAFPID-1296723", "CSAFPID-2631924", "CSAFPID-2631925", "CSAFPID-2631926", "CSAFPID-2631927", "CSAFPID-2631928", "CSAFPID-2631929", "CSAFPID-2631932", "CSAFPID-2631933", "CSAFPID-2631934", "CSAFPID-2631935", "CSAFPID-1765658", "CSAFPID-1765659", "CSAFPID-2631856", "CSAFPID-2631858", "CSAFPID-2631860", "CSAFPID-2631862", "CSAFPID-1765660", "CSAFPID-2631936", "CSAFPID-2631937", "CSAFPID-2631938", "CSAFPID-2631939", "CSAFPID-2631940", "CSAFPID-2631920", "CSAFPID-2631921", "CSAFPID-2631922", "CSAFPID-2631967", "CSAFPID-2631968", "CSAFPID-2631969", "CSAFPID-2632004", "CSAFPID-2632005", "CSAFPID-2632006", "CSAFPID-2632007", "CSAFPID-2632008", "CSAFPID-2631966", "CSAFPID-1765690", "CSAFPID-1765691", "CSAFPID-2459039", "CSAFPID-2631970", "CSAFPID-2631971", "CSAFPID-2631972", "CSAFPID-2631973", "CSAFPID-2631974", "CSAFPID-2631975", "CSAFPID-1765700", "CSAFPID-1765701", "CSAFPID-2631976", "CSAFPID-2631977", "CSAFPID-1296980", "CSAFPID-2631978", "CSAFPID-2631979", "CSAFPID-2631980", "CSAFPID-2631981", "CSAFPID-2631982", "CSAFPID-2631983", "CSAFPID-2631984", "CSAFPID-2631985", "CSAFPID-2632402", "CSAFPID-2631802", "CSAFPID-2631803", "CSAFPID-2631804", "CSAFPID-2631805", "CSAFPID-1296837", "CSAFPID-2631806", "CSAFPID-1211926", "CSAFPID-2619361", "CSAFPID-1209122" ] }, "references": [ { "category": "self", "summary": "CVE-2025-30000", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-30000.json" } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-2631845", "CSAFPID-2631844", "CSAFPID-2631843", "CSAFPID-2631842", "CSAFPID-2631841", "CSAFPID-2631840", "CSAFPID-2631839", "CSAFPID-2631838", "CSAFPID-2631837", "CSAFPID-2631836", "CSAFPID-2631835", "CSAFPID-2631900", "CSAFPID-2632341", "CSAFPID-2632342", "CSAFPID-2632343", "CSAFPID-2631790", "CSAFPID-2632460", "CSAFPID-2632459", "CSAFPID-2631854", "CSAFPID-2631855", "CSAFPID-2632083", "CSAFPID-1296722", "CSAFPID-2631923", "CSAFPID-1296723", "CSAFPID-2631924", "CSAFPID-2631925", "CSAFPID-2631926", "CSAFPID-2631927", "CSAFPID-2631928", "CSAFPID-2631929", "CSAFPID-2631932", "CSAFPID-2631933", "CSAFPID-2631934", "CSAFPID-2631935", "CSAFPID-1765658", "CSAFPID-1765659", "CSAFPID-2631856", "CSAFPID-2631858", "CSAFPID-2631860", "CSAFPID-2631862", "CSAFPID-1765660", "CSAFPID-2631936", "CSAFPID-2631937", "CSAFPID-2631938", "CSAFPID-2631939", "CSAFPID-2631940", "CSAFPID-2631920", "CSAFPID-2631921", "CSAFPID-2631922", "CSAFPID-2631967", "CSAFPID-2631968", "CSAFPID-2631969", "CSAFPID-2632004", "CSAFPID-2632005", "CSAFPID-2632006", "CSAFPID-2632007", "CSAFPID-2632008", "CSAFPID-2631966", "CSAFPID-1765690", "CSAFPID-1765691", "CSAFPID-2459039", "CSAFPID-2631970", "CSAFPID-2631971", "CSAFPID-2631972", "CSAFPID-2631973", "CSAFPID-2631974", "CSAFPID-2631975", "CSAFPID-1765700", "CSAFPID-1765701", "CSAFPID-2631976", "CSAFPID-2631977", "CSAFPID-1296980", "CSAFPID-2631978", "CSAFPID-2631979", "CSAFPID-2631980", "CSAFPID-2631981", "CSAFPID-2631982", "CSAFPID-2631983", "CSAFPID-2631984", "CSAFPID-2631985", "CSAFPID-2632402", "CSAFPID-2631802", "CSAFPID-2631803", "CSAFPID-2631804", "CSAFPID-2631805", "CSAFPID-1296837", "CSAFPID-2631806", "CSAFPID-1211926", "CSAFPID-2619361", "CSAFPID-1209122" ] } ], "title": "CVE-2025-30000" } ] }
fkie_cve-2022-21658
Vulnerability from fkie_nvd
Published
2022-01-20 18:15
Modified
2024-11-21 06:45
Severity ?
7.3 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:H
6.3 (Medium) - CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H
6.3 (Medium) - CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H
Summary
Rust is a multi-paradigm, general-purpose programming language designed for performance and safety, especially safe concurrency. The Rust Security Response WG was notified that the `std::fs::remove_dir_all` standard library function is vulnerable a race condition enabling symlink following (CWE-363). An attacker could use this security issue to trick a privileged program into deleting files and directories the attacker couldn't otherwise access or delete. Rust 1.0.0 through Rust 1.58.0 is affected by this vulnerability with 1.58.1 containing a patch. Note that the following build targets don't have usable APIs to properly mitigate the attack, and are thus still vulnerable even with a patched toolchain: macOS before version 10.10 (Yosemite) and REDOX. We recommend everyone to update to Rust 1.58.1 as soon as possible, especially people developing programs expected to run in privileged contexts (including system daemons and setuid binaries), as those have the highest risk of being affected by this. Note that adding checks in your codebase before calling remove_dir_all will not mitigate the vulnerability, as they would also be vulnerable to race conditions like remove_dir_all itself. The existing mitigation is working as intended outside of race conditions.
References
▶ | URL | Tags | |
---|---|---|---|
security-advisories@github.com | https://blog.rust-lang.org/2022/01/20/cve-2022-21658.html | Exploit, Mitigation, Vendor Advisory | |
security-advisories@github.com | https://github.com/rust-lang/rust/pull/93110 | Patch, Third Party Advisory | |
security-advisories@github.com | https://github.com/rust-lang/rust/pull/93110/commits/32ed6e599bb4722efefd78bbc9cd7ec4613cb946 | Patch, Third Party Advisory | |
security-advisories@github.com | https://github.com/rust-lang/rust/pull/93110/commits/406cc071d6cfdfdb678bf3d83d766851de95abaf | Patch, Third Party Advisory | |
security-advisories@github.com | https://github.com/rust-lang/rust/pull/93110/commits/4f0ad1c92ca08da6e8dc17838070975762f59714 | Patch, Third Party Advisory | |
security-advisories@github.com | https://github.com/rust-lang/rust/security/advisories/GHSA-r9cc-f5pr-p3j2 | Exploit, Mitigation, Third Party Advisory | |
security-advisories@github.com | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7JKZDTBMGAWIFJSNWKBMPO5EAKRR4BEW/ | ||
security-advisories@github.com | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BK32QZLHDC2OVLPKTUHNT2G3VHWHD4LX/ | ||
security-advisories@github.com | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/C63NH72Q7UHJM5V3IVYRI7LVBGGFQMSQ/ | ||
security-advisories@github.com | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CKGTACKMKAPRDPWPTU26GYWBELIRFF5N/ | ||
security-advisories@github.com | https://security.gentoo.org/glsa/202210-09 | Third Party Advisory | |
security-advisories@github.com | https://support.apple.com/kb/HT213182 | Third Party Advisory | |
security-advisories@github.com | https://support.apple.com/kb/HT213183 | Third Party Advisory | |
security-advisories@github.com | https://support.apple.com/kb/HT213186 | Third Party Advisory | |
security-advisories@github.com | https://support.apple.com/kb/HT213193 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://blog.rust-lang.org/2022/01/20/cve-2022-21658.html | Exploit, Mitigation, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/rust-lang/rust/pull/93110 | Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/rust-lang/rust/pull/93110/commits/32ed6e599bb4722efefd78bbc9cd7ec4613cb946 | Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/rust-lang/rust/pull/93110/commits/406cc071d6cfdfdb678bf3d83d766851de95abaf | Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/rust-lang/rust/pull/93110/commits/4f0ad1c92ca08da6e8dc17838070975762f59714 | Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/rust-lang/rust/security/advisories/GHSA-r9cc-f5pr-p3j2 | Exploit, Mitigation, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7JKZDTBMGAWIFJSNWKBMPO5EAKRR4BEW/ | ||
af854a3a-2127-422b-91ae-364da2661108 | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BK32QZLHDC2OVLPKTUHNT2G3VHWHD4LX/ | ||
af854a3a-2127-422b-91ae-364da2661108 | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/C63NH72Q7UHJM5V3IVYRI7LVBGGFQMSQ/ | ||
af854a3a-2127-422b-91ae-364da2661108 | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CKGTACKMKAPRDPWPTU26GYWBELIRFF5N/ | ||
af854a3a-2127-422b-91ae-364da2661108 | https://security.gentoo.org/glsa/202210-09 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://support.apple.com/kb/HT213182 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://support.apple.com/kb/HT213183 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://support.apple.com/kb/HT213186 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://support.apple.com/kb/HT213193 | Third Party Advisory |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:rust-lang:rust:*:*:*:*:*:*:*:*", "matchCriteriaId": "C1A1524F-CF05-4E2D-9A5B-B9A882DFF66D", "versionEndIncluding": "1.58.0", "versionStartIncluding": "1.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*", "matchCriteriaId": "A930E247-0B43-43CB-98FF-6CE7B8189835", "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*", "matchCriteriaId": "80E516C0-98A4-4ADE-B69F-66A772E2BAAA", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", "matchCriteriaId": "7A28B309-0018-46A4-A533-F10428F689B4", "versionEndExcluding": "15.4", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "matchCriteriaId": "1E4C3F0C-E368-4F79-B42E-E5EB0FB5E767", "versionEndExcluding": "15.4", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", "matchCriteriaId": "9422A022-F279-4596-BC97-3223611D73DC", "versionEndExcluding": "12.3", "versionStartIncluding": "12.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", "matchCriteriaId": "70A2E262-1C91-4030-A2D5-E089C271EA34", "versionEndExcluding": "15.4", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*", "matchCriteriaId": "17C8B971-2F25-4961-B1AF-F4AAB1848990", "versionEndExcluding": "8.5", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Rust is a multi-paradigm, general-purpose programming language designed for performance and safety, especially safe concurrency. The Rust Security Response WG was notified that the `std::fs::remove_dir_all` standard library function is vulnerable a race condition enabling symlink following (CWE-363). An attacker could use this security issue to trick a privileged program into deleting files and directories the attacker couldn\u0027t otherwise access or delete. Rust 1.0.0 through Rust 1.58.0 is affected by this vulnerability with 1.58.1 containing a patch. Note that the following build targets don\u0027t have usable APIs to properly mitigate the attack, and are thus still vulnerable even with a patched toolchain: macOS before version 10.10 (Yosemite) and REDOX. We recommend everyone to update to Rust 1.58.1 as soon as possible, especially people developing programs expected to run in privileged contexts (including system daemons and setuid binaries), as those have the highest risk of being affected by this. Note that adding checks in your codebase before calling remove_dir_all will not mitigate the vulnerability, as they would also be vulnerable to race conditions like remove_dir_all itself. The existing mitigation is working as intended outside of race conditions." }, { "lang": "es", "value": "Rust es un lenguaje de programaci\u00f3n multiparadigma de prop\u00f3sito general dise\u00f1ado para el rendimiento y la seguridad, especialmente la concurrencia segura. El Grupo de Trabajo de Respuesta de Seguridad de Rust fue notificado de que la funci\u00f3n de la biblioteca est\u00e1ndar \"std::fs::remove_dir_all\" es vulnerable a una condici\u00f3n de carrera que permite el seguimiento de enlaces simb\u00f3licos (CWE-363). Un atacante podr\u00eda usar este problema de seguridad para enga\u00f1ar a un programa con privilegios para que elimine archivos y directorios a los que el atacante no podr\u00eda acceder o eliminar de otro modo. Rust versiones 1.0.0 hasta Rust versi\u00f3n 1.58.0 est\u00e1n afectados por esta vulnerabilidad, con la versi\u00f3n 1.58.1 que contiene un parche. Tenga en cuenta que los siguientes objetivos de construcci\u00f3n no presentan APIs usables para mitigar apropiadamente el ataque, y por lo tanto siguen siendo vulnerables incluso con una cadena de herramientas parcheada: macOS versiones anteriores a 10.10 (Yosemite) y REDOX. Recomendamos a todo el mundo que actualice a Rust versi\u00f3n 1.58.1 tan pronto como sea posible, especialmente a las personas que desarrollan programas que esperan que sean ejecutados en contextos privilegiados (incluidos los demonios del sistema y los binarios setuid), ya que son los que presentan el mayor riesgo de estar afectados por esto. Tenga en cuenta que a\u00f1adir comprobaciones en su c\u00f3digo base antes de llamar a remove_dir_all no mitigar\u00e1 la vulnerabilidad, ya que tambi\u00e9n ser\u00edan vulnerables a condiciones de carrera como el propio remove_dir_all. La mitigaci\u00f3n existente funciona como es pretendido fuera de las condiciones de carrera" } ], "id": "CVE-2022-21658", "lastModified": "2024-11-21T06:45:10.343", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 3.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:M/Au:N/C:N/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.4, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:H", "version": "3.1" }, "exploitabilityScore": 2.0, "impactScore": 4.7, "source": "security-advisories@github.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.0, "impactScore": 5.2, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-01-20T18:15:07.703", "references": [ { "source": "security-advisories@github.com", "tags": [ "Exploit", "Mitigation", "Vendor Advisory" ], "url": "https://blog.rust-lang.org/2022/01/20/cve-2022-21658.html" }, { "source": "security-advisories@github.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/rust-lang/rust/pull/93110" }, { "source": "security-advisories@github.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/rust-lang/rust/pull/93110/commits/32ed6e599bb4722efefd78bbc9cd7ec4613cb946" }, { "source": "security-advisories@github.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/rust-lang/rust/pull/93110/commits/406cc071d6cfdfdb678bf3d83d766851de95abaf" }, { "source": "security-advisories@github.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/rust-lang/rust/pull/93110/commits/4f0ad1c92ca08da6e8dc17838070975762f59714" }, { "source": "security-advisories@github.com", "tags": [ "Exploit", "Mitigation", "Third Party Advisory" ], "url": "https://github.com/rust-lang/rust/security/advisories/GHSA-r9cc-f5pr-p3j2" }, { "source": "security-advisories@github.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7JKZDTBMGAWIFJSNWKBMPO5EAKRR4BEW/" }, { "source": "security-advisories@github.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BK32QZLHDC2OVLPKTUHNT2G3VHWHD4LX/" }, { "source": "security-advisories@github.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/C63NH72Q7UHJM5V3IVYRI7LVBGGFQMSQ/" }, { "source": "security-advisories@github.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CKGTACKMKAPRDPWPTU26GYWBELIRFF5N/" }, { "source": "security-advisories@github.com", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/202210-09" }, { "source": "security-advisories@github.com", "tags": [ "Third Party Advisory" ], "url": "https://support.apple.com/kb/HT213182" }, { "source": "security-advisories@github.com", "tags": [ "Third Party Advisory" ], "url": "https://support.apple.com/kb/HT213183" }, { "source": "security-advisories@github.com", "tags": [ "Third Party Advisory" ], "url": "https://support.apple.com/kb/HT213186" }, { "source": "security-advisories@github.com", "tags": [ "Third Party Advisory" ], "url": "https://support.apple.com/kb/HT213193" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Mitigation", "Vendor Advisory" ], "url": "https://blog.rust-lang.org/2022/01/20/cve-2022-21658.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/rust-lang/rust/pull/93110" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/rust-lang/rust/pull/93110/commits/32ed6e599bb4722efefd78bbc9cd7ec4613cb946" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/rust-lang/rust/pull/93110/commits/406cc071d6cfdfdb678bf3d83d766851de95abaf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/rust-lang/rust/pull/93110/commits/4f0ad1c92ca08da6e8dc17838070975762f59714" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Mitigation", "Third Party Advisory" ], "url": "https://github.com/rust-lang/rust/security/advisories/GHSA-r9cc-f5pr-p3j2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7JKZDTBMGAWIFJSNWKBMPO5EAKRR4BEW/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BK32QZLHDC2OVLPKTUHNT2G3VHWHD4LX/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/C63NH72Q7UHJM5V3IVYRI7LVBGGFQMSQ/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CKGTACKMKAPRDPWPTU26GYWBELIRFF5N/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/202210-09" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://support.apple.com/kb/HT213182" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://support.apple.com/kb/HT213183" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://support.apple.com/kb/HT213186" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://support.apple.com/kb/HT213193" } ], "sourceIdentifier": "security-advisories@github.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-363" }, { "lang": "en", "value": "CWE-367" } ], "source": "security-advisories@github.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-367" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
wid-sec-w-2023-0561
Vulnerability from csaf_certbund
Published
2023-03-02 23:00
Modified
2023-05-18 22:00
Summary
Xerox FreeFlow Print Server: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
FreeFlow-Druckserver ist eine Druckserveranwendung für Xerox-Produktionsdrucker, die Flexibilität, umfangreiche Workflow-Optionen und eine Farbverwaltung bietet.
Angriff
Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Xerox FreeFlow Print Server ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.
Betroffene Betriebssysteme
- UNIX
- Linux
- Windows
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "FreeFlow-Druckserver ist eine Druckserveranwendung f\u00fcr Xerox-Produktionsdrucker, die Flexibilit\u00e4t, umfangreiche Workflow-Optionen und eine Farbverwaltung bietet.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Xerox FreeFlow Print Server ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden.", "title": "Angriff" }, { "category": "general", "text": "- UNIX\n- Linux\n- Windows", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2023-0561 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2023/wid-sec-w-2023-0561.json" }, { "category": "self", "summary": "WID-SEC-2023-0561 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-0561" }, { "category": "external", "summary": "XEROX Security Advisory XRX23-007 vom 2023-05-18", "url": "https://security.business.xerox.com/wp-content/uploads/2023/05/Xerox-Security-Bulletin-XRX23-007-Xerox%C2%AE-FreeFlow%C2%AE-Print-Server-v7.pdf" }, { "category": "external", "summary": "XEROX Security Advisory XRX23-005 vom 2023-04-04", "url": "https://security.business.xerox.com/wp-content/uploads/2023/04/Xerox-Security-Bulletin-XRX23-005-Xerox%25C2%25AE-FreeFlow%25C2%25AE-Print-Server-v9.pdf" }, { "category": "external", "summary": "XEROX Security Advisory XRX23-002 vom 2023-03-23", "url": "https://security.business.xerox.com/wp-content/uploads/2023/03/Xerox-Security-Bulletin-XRX23-002-FreeFlow-Print-Server-v2_Windows10.pdf" }, { "category": "external", "summary": "Xerox Mini Bulletin XRX21A vom 2023-03-02", "url": "https://security.business.xerox.com/wp-content/uploads/2023/03/Xerox-Security-Bulletin-XRX23-001-FreeFlow%C2%AE-Print-Server-v7.pdf" } ], "source_lang": "en-US", "title": "Xerox FreeFlow Print Server: Mehrere Schwachstellen", "tracking": { "current_release_date": "2023-05-18T22:00:00.000+00:00", "generator": { "date": "2024-08-15T17:46:07.359+00:00", "engine": { "name": "BSI-WID", "version": "1.3.5" } }, "id": "WID-SEC-W-2023-0561", "initial_release_date": "2023-03-02T23:00:00.000+00:00", "revision_history": [ { "date": "2023-03-02T23:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2023-03-22T23:00:00.000+00:00", "number": "2", "summary": "Neue Updates von XEROX aufgenommen" }, { "date": "2023-04-03T22:00:00.000+00:00", "number": "3", "summary": "Neue Updates von XEROX aufgenommen" }, { "date": "2023-05-18T22:00:00.000+00:00", "number": "4", "summary": "Neue Updates von XEROX aufgenommen" } ], "status": "final", "version": "4" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Xerox FreeFlow Print Server 7", "product": { "name": "Xerox FreeFlow Print Server 7", "product_id": "T000872", "product_identification_helper": { "cpe": "cpe:/a:xerox:freeflow_print_server:7" } } }, { "category": "product_name", "name": "Xerox FreeFlow Print Server 9", "product": { "name": "Xerox FreeFlow Print Server 9", "product_id": "T002977", "product_identification_helper": { "cpe": "cpe:/a:xerox:freeflow_print_server:9" } } }, { "category": "product_name", "name": "Xerox FreeFlow Print Server v2", "product": { "name": "Xerox FreeFlow Print Server v2", "product_id": "T014888", "product_identification_helper": { "cpe": "cpe:/a:xerox:freeflow_print_server:v2" } } } ], "category": "product_name", "name": "FreeFlow Print Server" } ], "category": "vendor", "name": "Xerox" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-21900", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00.000+00:00", "title": "CVE-2023-21900" }, { "cve": "CVE-2023-21843", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00.000+00:00", "title": "CVE-2023-21843" }, { "cve": "CVE-2023-21835", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00.000+00:00", "title": "CVE-2023-21835" }, { "cve": "CVE-2023-21830", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00.000+00:00", "title": "CVE-2023-21830" }, { "cve": "CVE-2022-46882", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00.000+00:00", "title": "CVE-2022-46882" }, { "cve": "CVE-2022-46881", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00.000+00:00", "title": "CVE-2022-46881" }, { "cve": "CVE-2022-46880", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00.000+00:00", "title": "CVE-2022-46880" }, { "cve": "CVE-2022-46878", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00.000+00:00", "title": "CVE-2022-46878" }, { "cve": "CVE-2022-46875", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00.000+00:00", "title": "CVE-2022-46875" }, { "cve": "CVE-2022-46874", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00.000+00:00", "title": "CVE-2022-46874" }, { "cve": "CVE-2022-46872", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00.000+00:00", "title": "CVE-2022-46872" }, { "cve": "CVE-2022-45421", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00.000+00:00", "title": "CVE-2022-45421" }, { "cve": "CVE-2022-45420", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00.000+00:00", "title": "CVE-2022-45420" }, { "cve": "CVE-2022-45419", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00.000+00:00", "title": "CVE-2022-45419" }, { "cve": "CVE-2022-45418", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00.000+00:00", "title": "CVE-2022-45418" }, { "cve": "CVE-2022-45417", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00.000+00:00", "title": "CVE-2022-45417" }, { "cve": "CVE-2022-45416", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00.000+00:00", "title": "CVE-2022-45416" }, { "cve": "CVE-2022-45415", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00.000+00:00", "title": "CVE-2022-45415" }, { "cve": "CVE-2022-45414", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00.000+00:00", "title": "CVE-2022-45414" }, { "cve": "CVE-2022-45413", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00.000+00:00", "title": "CVE-2022-45413" }, { "cve": "CVE-2022-45412", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00.000+00:00", "title": "CVE-2022-45412" }, { "cve": "CVE-2022-45411", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00.000+00:00", "title": "CVE-2022-45411" }, { "cve": "CVE-2022-45410", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00.000+00:00", "title": "CVE-2022-45410" }, { "cve": "CVE-2022-45409", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00.000+00:00", "title": "CVE-2022-45409" }, { "cve": "CVE-2022-45408", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00.000+00:00", "title": "CVE-2022-45408" }, { "cve": "CVE-2022-45407", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00.000+00:00", "title": "CVE-2022-45407" }, { "cve": "CVE-2022-45406", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00.000+00:00", "title": "CVE-2022-45406" }, { "cve": "CVE-2022-45405", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00.000+00:00", "title": "CVE-2022-45405" }, { "cve": "CVE-2022-45404", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00.000+00:00", "title": "CVE-2022-45404" }, { "cve": "CVE-2022-45403", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00.000+00:00", "title": "CVE-2022-45403" }, { "cve": "CVE-2022-45063", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00.000+00:00", "title": "CVE-2022-45063" }, { "cve": "CVE-2022-45061", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00.000+00:00", "title": "CVE-2022-45061" }, { "cve": "CVE-2022-44638", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00.000+00:00", "title": "CVE-2022-44638" }, { "cve": "CVE-2022-43680", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00.000+00:00", "title": "CVE-2022-43680" }, { "cve": "CVE-2022-43548", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00.000+00:00", "title": "CVE-2022-43548" }, { "cve": "CVE-2022-42932", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00.000+00:00", "title": "CVE-2022-42932" }, { "cve": "CVE-2022-42929", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00.000+00:00", "title": "CVE-2022-42929" }, { "cve": "CVE-2022-42928", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00.000+00:00", "title": "CVE-2022-42928" }, { "cve": "CVE-2022-42927", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00.000+00:00", "title": "CVE-2022-42927" }, { "cve": "CVE-2022-42252", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00.000+00:00", "title": "CVE-2022-42252" }, { "cve": "CVE-2022-41556", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00.000+00:00", "title": "CVE-2022-41556" }, { "cve": "CVE-2022-41323", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00.000+00:00", "title": "CVE-2022-41323" }, { "cve": "CVE-2022-40962", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00.000+00:00", "title": "CVE-2022-40962" }, { "cve": "CVE-2022-40960", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00.000+00:00", "title": "CVE-2022-40960" }, { "cve": "CVE-2022-40959", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00.000+00:00", "title": "CVE-2022-40959" }, { "cve": "CVE-2022-40958", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00.000+00:00", "title": "CVE-2022-40958" }, { "cve": "CVE-2022-40957", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00.000+00:00", "title": "CVE-2022-40957" }, { "cve": "CVE-2022-40956", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00.000+00:00", "title": "CVE-2022-40956" }, { "cve": "CVE-2022-40674", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00.000+00:00", "title": "CVE-2022-40674" }, { "cve": "CVE-2022-3970", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00.000+00:00", "title": "CVE-2022-3970" }, { "cve": "CVE-2022-39260", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00.000+00:00", "title": "CVE-2022-39260" }, { "cve": "CVE-2022-39253", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00.000+00:00", "title": "CVE-2022-39253" }, { "cve": "CVE-2022-3786", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00.000+00:00", "title": "CVE-2022-3786" }, { "cve": "CVE-2022-37797", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00.000+00:00", "title": "CVE-2022-37797" }, { "cve": "CVE-2022-37454", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00.000+00:00", "title": "CVE-2022-37454" }, { "cve": "CVE-2022-37436", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00.000+00:00", "title": "CVE-2022-37436" }, { "cve": "CVE-2022-36760", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00.000+00:00", "title": "CVE-2022-36760" }, { "cve": "CVE-2022-3627", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00.000+00:00", "title": "CVE-2022-3627" }, { "cve": "CVE-2022-3626", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00.000+00:00", "title": "CVE-2022-3626" }, { "cve": "CVE-2022-36087", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00.000+00:00", "title": "CVE-2022-36087" }, { "cve": "CVE-2022-36059", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00.000+00:00", "title": "CVE-2022-36059" }, { "cve": "CVE-2022-3602", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00.000+00:00", "title": "CVE-2022-3602" }, { "cve": "CVE-2022-3599", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00.000+00:00", "title": "CVE-2022-3599" }, { "cve": "CVE-2022-3598", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00.000+00:00", "title": "CVE-2022-3598" }, { "cve": "CVE-2022-3597", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00.000+00:00", "title": "CVE-2022-3597" }, { "cve": "CVE-2022-3570", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00.000+00:00", "title": "CVE-2022-3570" }, { "cve": "CVE-2022-35256", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00.000+00:00", "title": "CVE-2022-35256" }, { "cve": "CVE-2022-35255", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00.000+00:00", "title": "CVE-2022-35255" }, { "cve": "CVE-2022-34526", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00.000+00:00", "title": "CVE-2022-34526" }, { "cve": "CVE-2022-3276", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00.000+00:00", "title": "CVE-2022-3276" }, { "cve": "CVE-2022-32222", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00.000+00:00", "title": "CVE-2022-32222" }, { "cve": "CVE-2022-32215", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00.000+00:00", "title": "CVE-2022-32215" }, { "cve": "CVE-2022-32213", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00.000+00:00", "title": "CVE-2022-32213" }, { "cve": "CVE-2022-32212", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00.000+00:00", "title": "CVE-2022-32212" }, { "cve": "CVE-2022-3204", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00.000+00:00", "title": "CVE-2022-3204" }, { "cve": "CVE-2022-3190", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00.000+00:00", "title": "CVE-2022-3190" }, { "cve": "CVE-2022-31630", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00.000+00:00", "title": "CVE-2022-31630" }, { "cve": "CVE-2022-31629", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00.000+00:00", "title": "CVE-2022-31629" }, { "cve": "CVE-2022-31628", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00.000+00:00", "title": "CVE-2022-31628" }, { "cve": "CVE-2022-3155", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00.000+00:00", "title": "CVE-2022-3155" }, { "cve": "CVE-2022-3034", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00.000+00:00", "title": "CVE-2022-3034" }, { "cve": "CVE-2022-3033", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00.000+00:00", "title": "CVE-2022-3033" }, { "cve": "CVE-2022-3032", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00.000+00:00", "title": "CVE-2022-3032" }, { "cve": "CVE-2022-29458", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00.000+00:00", "title": "CVE-2022-29458" }, { "cve": "CVE-2022-29187", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00.000+00:00", "title": "CVE-2022-29187" }, { "cve": "CVE-2022-29154", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00.000+00:00", "title": "CVE-2022-29154" }, { "cve": "CVE-2022-2869", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00.000+00:00", "title": "CVE-2022-2869" }, { "cve": "CVE-2022-2868", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00.000+00:00", "title": "CVE-2022-2868" }, { "cve": "CVE-2022-2867", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00.000+00:00", "title": "CVE-2022-2867" }, { "cve": "CVE-2022-27406", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00.000+00:00", "title": "CVE-2022-27406" }, { "cve": "CVE-2022-27405", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00.000+00:00", "title": "CVE-2022-27405" }, { "cve": "CVE-2022-27404", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00.000+00:00", "title": "CVE-2022-27404" }, { "cve": "CVE-2022-26981", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00.000+00:00", "title": "CVE-2022-26981" }, { "cve": "CVE-2022-24765", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00.000+00:00", "title": "CVE-2022-24765" }, { "cve": "CVE-2022-24070", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00.000+00:00", "title": "CVE-2022-24070" }, { "cve": "CVE-2022-23901", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00.000+00:00", "title": "CVE-2022-23901" }, { "cve": "CVE-2022-22844", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00.000+00:00", "title": "CVE-2022-22844" }, { "cve": "CVE-2022-2210", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00.000+00:00", "title": "CVE-2022-2210" }, { "cve": "CVE-2022-2208", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00.000+00:00", "title": "CVE-2022-2208" }, { "cve": "CVE-2022-2207", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00.000+00:00", "title": "CVE-2022-2207" }, { "cve": "CVE-2022-2206", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00.000+00:00", "title": "CVE-2022-2206" }, { "cve": "CVE-2022-2183", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00.000+00:00", "title": "CVE-2022-2183" }, { "cve": "CVE-2022-2175", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00.000+00:00", "title": "CVE-2022-2175" }, { "cve": "CVE-2022-21658", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00.000+00:00", "title": "CVE-2022-21658" }, { "cve": "CVE-2022-21628", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00.000+00:00", "title": "CVE-2022-21628" }, { "cve": "CVE-2022-21626", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00.000+00:00", "title": "CVE-2022-21626" }, { "cve": "CVE-2022-21624", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00.000+00:00", "title": "CVE-2022-21624" }, { "cve": "CVE-2022-21619", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00.000+00:00", "title": "CVE-2022-21619" }, { "cve": "CVE-2022-2125", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00.000+00:00", "title": "CVE-2022-2125" }, { "cve": "CVE-2022-2122", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00.000+00:00", "title": "CVE-2022-2122" }, { "cve": "CVE-2022-2058", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00.000+00:00", "title": "CVE-2022-2058" }, { "cve": "CVE-2022-2057", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00.000+00:00", "title": "CVE-2022-2057" }, { "cve": "CVE-2022-2056", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00.000+00:00", "title": "CVE-2022-2056" }, { "cve": "CVE-2022-1925", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00.000+00:00", "title": "CVE-2022-1925" }, { "cve": "CVE-2022-1924", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00.000+00:00", "title": "CVE-2022-1924" }, { "cve": "CVE-2022-1923", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00.000+00:00", "title": "CVE-2022-1923" }, { "cve": "CVE-2022-1922", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00.000+00:00", "title": "CVE-2022-1922" }, { "cve": "CVE-2022-1921", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00.000+00:00", "title": "CVE-2022-1921" }, { "cve": "CVE-2022-1920", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00.000+00:00", "title": "CVE-2022-1920" }, { "cve": "CVE-2022-1348", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00.000+00:00", "title": "CVE-2022-1348" }, { "cve": "CVE-2022-1056", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00.000+00:00", "title": "CVE-2022-1056" }, { "cve": "CVE-2022-0924", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00.000+00:00", "title": "CVE-2022-0924" }, { "cve": "CVE-2022-0909", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00.000+00:00", "title": "CVE-2022-0909" }, { "cve": "CVE-2022-0908", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00.000+00:00", "title": "CVE-2022-0908" }, { "cve": "CVE-2022-0907", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00.000+00:00", "title": "CVE-2022-0907" }, { "cve": "CVE-2022-0891", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00.000+00:00", "title": "CVE-2022-0891" }, { "cve": "CVE-2022-0865", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00.000+00:00", "title": "CVE-2022-0865" }, { "cve": "CVE-2022-0562", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00.000+00:00", "title": "CVE-2022-0562" }, { "cve": "CVE-2022-0561", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00.000+00:00", "title": "CVE-2022-0561" }, { "cve": "CVE-2021-46848", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00.000+00:00", "title": "CVE-2021-46848" }, { "cve": "CVE-2021-46823", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00.000+00:00", "title": "CVE-2021-46823" }, { "cve": "CVE-2021-42694", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00.000+00:00", "title": "CVE-2021-42694" }, { "cve": "CVE-2021-42574", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00.000+00:00", "title": "CVE-2021-42574" }, { "cve": "CVE-2021-37750", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00.000+00:00", "title": "CVE-2021-37750" }, { "cve": "CVE-2021-28544", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00.000+00:00", "title": "CVE-2021-28544" }, { "cve": "CVE-2020-10735", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00.000+00:00", "title": "CVE-2020-10735" }, { "cve": "CVE-2019-6111", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00.000+00:00", "title": "CVE-2019-6111" }, { "cve": "CVE-2018-7160", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00.000+00:00", "title": "CVE-2018-7160" }, { "cve": "CVE-2015-20107", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00.000+00:00", "title": "CVE-2015-20107" }, { "cve": "CVE-2006-20001", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T014888", "T000872", "T002977" ] }, "release_date": "2023-03-02T23:00:00.000+00:00", "title": "CVE-2006-20001" } ] }
rhsa-2022:1894
Vulnerability from csaf_redhat
Published
2022-05-10 13:35
Modified
2025-07-31 12:56
Summary
Red Hat Security Advisory: rust-toolset:rhel8 security, bug fix, and enhancement update
Notes
Topic
An update for the rust-toolset:rhel8 module is now available for Red Hat Enterprise Linux 8.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Rust Toolset provides the Rust programming language compiler rustc, the cargo build tool and dependency manager, and required libraries.
The following packages have been upgraded to a later upstream version: rust (1.58.0). (BZ#2002883)
Security Fix(es):
* rust: Race condition in remove_dir_all leading to removal of files outside of the directory being removed (CVE-2022-21658)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.6 Release Notes linked from the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for the rust-toolset:rhel8 module is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Rust Toolset provides the Rust programming language compiler rustc, the cargo build tool and dependency manager, and required libraries. \n\nThe following packages have been upgraded to a later upstream version: rust (1.58.0). (BZ#2002883)\n\nSecurity Fix(es):\n\n* rust: Race condition in remove_dir_all leading to removal of files outside of the directory being removed (CVE-2022-21658)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.6 Release Notes linked from the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:1894", "url": "https://access.redhat.com/errata/RHSA-2022:1894" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.6_release_notes/", "url": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.6_release_notes/" }, { "category": "external", "summary": "1980080", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980080" }, { "category": "external", "summary": "2041504", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2041504" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_1894.json" } ], "title": "Red Hat Security Advisory: rust-toolset:rhel8 security, bug fix, and enhancement update", "tracking": { "current_release_date": "2025-07-31T12:56:44+00:00", "generator": { "date": "2025-07-31T12:56:44+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2022:1894", "initial_release_date": "2022-05-10T13:35:59+00:00", "revision_history": [ { "date": "2022-05-10T13:35:59+00:00", "number": "1", "summary": "Initial version" }, { "date": "2022-05-10T13:35:59+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-07-31T12:56:44+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream (v. 8)", "product": { "name": "Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.GA", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:8::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "rust-toolset:rhel8:8060020220125235043:eab6f2ea", "product": { "name": "rust-toolset:rhel8:8060020220125235043:eab6f2ea", "product_id": "rust-toolset:rhel8:8060020220125235043:eab6f2ea", "product_identification_helper": { "purl": "pkg:rpm/redhat/rust-toolset@rhel8?rpmmod=rust-toolset:rhel8:8060020220125235043:eab6f2ea" } } }, { "category": "product_version", "name": "cargo-doc-0:1.58.1-1.module+el8.6.0+14021+586eff1a.noarch", "product": { "name": "cargo-doc-0:1.58.1-1.module+el8.6.0+14021+586eff1a.noarch", "product_id": "cargo-doc-0:1.58.1-1.module+el8.6.0+14021+586eff1a.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/cargo-doc@1.58.1-1.module%2Bel8.6.0%2B14021%2B586eff1a?arch=noarch" } } }, { "category": "product_version", "name": "rust-debugger-common-0:1.58.1-1.module+el8.6.0+14021+586eff1a.noarch", "product": { "name": "rust-debugger-common-0:1.58.1-1.module+el8.6.0+14021+586eff1a.noarch", "product_id": "rust-debugger-common-0:1.58.1-1.module+el8.6.0+14021+586eff1a.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rust-debugger-common@1.58.1-1.module%2Bel8.6.0%2B14021%2B586eff1a?arch=noarch" } } }, { "category": "product_version", "name": "rust-gdb-0:1.58.1-1.module+el8.6.0+14021+586eff1a.noarch", "product": { "name": "rust-gdb-0:1.58.1-1.module+el8.6.0+14021+586eff1a.noarch", "product_id": "rust-gdb-0:1.58.1-1.module+el8.6.0+14021+586eff1a.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rust-gdb@1.58.1-1.module%2Bel8.6.0%2B14021%2B586eff1a?arch=noarch" } } }, { "category": "product_version", "name": "rust-lldb-0:1.58.1-1.module+el8.6.0+14021+586eff1a.noarch", "product": { "name": "rust-lldb-0:1.58.1-1.module+el8.6.0+14021+586eff1a.noarch", "product_id": "rust-lldb-0:1.58.1-1.module+el8.6.0+14021+586eff1a.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rust-lldb@1.58.1-1.module%2Bel8.6.0%2B14021%2B586eff1a?arch=noarch" } } }, { "category": "product_version", "name": "rust-src-0:1.58.1-1.module+el8.6.0+14021+586eff1a.noarch", "product": { "name": "rust-src-0:1.58.1-1.module+el8.6.0+14021+586eff1a.noarch", "product_id": "rust-src-0:1.58.1-1.module+el8.6.0+14021+586eff1a.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rust-src@1.58.1-1.module%2Bel8.6.0%2B14021%2B586eff1a?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "cargo-0:1.58.1-1.module+el8.6.0+14021+586eff1a.aarch64", "product": { "name": "cargo-0:1.58.1-1.module+el8.6.0+14021+586eff1a.aarch64", "product_id": "cargo-0:1.58.1-1.module+el8.6.0+14021+586eff1a.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cargo@1.58.1-1.module%2Bel8.6.0%2B14021%2B586eff1a?arch=aarch64" } } }, { "category": "product_version", "name": "cargo-debuginfo-0:1.58.1-1.module+el8.6.0+14021+586eff1a.aarch64", "product": { "name": "cargo-debuginfo-0:1.58.1-1.module+el8.6.0+14021+586eff1a.aarch64", "product_id": "cargo-debuginfo-0:1.58.1-1.module+el8.6.0+14021+586eff1a.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cargo-debuginfo@1.58.1-1.module%2Bel8.6.0%2B14021%2B586eff1a?arch=aarch64" } } }, { "category": "product_version", "name": "clippy-0:1.58.1-1.module+el8.6.0+14021+586eff1a.aarch64", "product": { "name": "clippy-0:1.58.1-1.module+el8.6.0+14021+586eff1a.aarch64", "product_id": "clippy-0:1.58.1-1.module+el8.6.0+14021+586eff1a.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/clippy@1.58.1-1.module%2Bel8.6.0%2B14021%2B586eff1a?arch=aarch64" } } }, { "category": "product_version", "name": "clippy-debuginfo-0:1.58.1-1.module+el8.6.0+14021+586eff1a.aarch64", "product": { "name": "clippy-debuginfo-0:1.58.1-1.module+el8.6.0+14021+586eff1a.aarch64", "product_id": "clippy-debuginfo-0:1.58.1-1.module+el8.6.0+14021+586eff1a.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/clippy-debuginfo@1.58.1-1.module%2Bel8.6.0%2B14021%2B586eff1a?arch=aarch64" } } }, { "category": "product_version", "name": "rls-0:1.58.1-1.module+el8.6.0+14021+586eff1a.aarch64", "product": { "name": "rls-0:1.58.1-1.module+el8.6.0+14021+586eff1a.aarch64", "product_id": "rls-0:1.58.1-1.module+el8.6.0+14021+586eff1a.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rls@1.58.1-1.module%2Bel8.6.0%2B14021%2B586eff1a?arch=aarch64" } } }, { "category": "product_version", "name": "rls-debuginfo-0:1.58.1-1.module+el8.6.0+14021+586eff1a.aarch64", "product": { "name": "rls-debuginfo-0:1.58.1-1.module+el8.6.0+14021+586eff1a.aarch64", "product_id": "rls-debuginfo-0:1.58.1-1.module+el8.6.0+14021+586eff1a.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rls-debuginfo@1.58.1-1.module%2Bel8.6.0%2B14021%2B586eff1a?arch=aarch64" } } }, { "category": "product_version", "name": "rust-0:1.58.1-1.module+el8.6.0+14021+586eff1a.aarch64", "product": { "name": "rust-0:1.58.1-1.module+el8.6.0+14021+586eff1a.aarch64", "product_id": "rust-0:1.58.1-1.module+el8.6.0+14021+586eff1a.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rust@1.58.1-1.module%2Bel8.6.0%2B14021%2B586eff1a?arch=aarch64" } } }, { "category": "product_version", "name": "rust-analysis-0:1.58.1-1.module+el8.6.0+14021+586eff1a.aarch64", "product": { "name": "rust-analysis-0:1.58.1-1.module+el8.6.0+14021+586eff1a.aarch64", "product_id": "rust-analysis-0:1.58.1-1.module+el8.6.0+14021+586eff1a.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rust-analysis@1.58.1-1.module%2Bel8.6.0%2B14021%2B586eff1a?arch=aarch64" } } }, { "category": "product_version", "name": "rust-debuginfo-0:1.58.1-1.module+el8.6.0+14021+586eff1a.aarch64", "product": { "name": "rust-debuginfo-0:1.58.1-1.module+el8.6.0+14021+586eff1a.aarch64", "product_id": "rust-debuginfo-0:1.58.1-1.module+el8.6.0+14021+586eff1a.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rust-debuginfo@1.58.1-1.module%2Bel8.6.0%2B14021%2B586eff1a?arch=aarch64" } } }, { "category": "product_version", "name": "rust-debugsource-0:1.58.1-1.module+el8.6.0+14021+586eff1a.aarch64", "product": { "name": "rust-debugsource-0:1.58.1-1.module+el8.6.0+14021+586eff1a.aarch64", "product_id": "rust-debugsource-0:1.58.1-1.module+el8.6.0+14021+586eff1a.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rust-debugsource@1.58.1-1.module%2Bel8.6.0%2B14021%2B586eff1a?arch=aarch64" } } }, { "category": "product_version", "name": "rust-doc-0:1.58.1-1.module+el8.6.0+14021+586eff1a.aarch64", "product": { "name": "rust-doc-0:1.58.1-1.module+el8.6.0+14021+586eff1a.aarch64", "product_id": "rust-doc-0:1.58.1-1.module+el8.6.0+14021+586eff1a.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rust-doc@1.58.1-1.module%2Bel8.6.0%2B14021%2B586eff1a?arch=aarch64" } } }, { "category": "product_version", "name": "rust-std-static-0:1.58.1-1.module+el8.6.0+14021+586eff1a.aarch64", "product": { "name": "rust-std-static-0:1.58.1-1.module+el8.6.0+14021+586eff1a.aarch64", "product_id": "rust-std-static-0:1.58.1-1.module+el8.6.0+14021+586eff1a.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rust-std-static@1.58.1-1.module%2Bel8.6.0%2B14021%2B586eff1a?arch=aarch64" } } }, { "category": "product_version", "name": "rust-std-static-wasm32-unknown-unknown-0:1.58.1-1.module+el8.6.0+14021+586eff1a.aarch64", "product": { "name": "rust-std-static-wasm32-unknown-unknown-0:1.58.1-1.module+el8.6.0+14021+586eff1a.aarch64", "product_id": "rust-std-static-wasm32-unknown-unknown-0:1.58.1-1.module+el8.6.0+14021+586eff1a.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rust-std-static-wasm32-unknown-unknown@1.58.1-1.module%2Bel8.6.0%2B14021%2B586eff1a?arch=aarch64" } } }, { "category": "product_version", "name": "rust-std-static-wasm32-wasi-0:1.58.1-1.module+el8.6.0+14021+586eff1a.aarch64", "product": { "name": "rust-std-static-wasm32-wasi-0:1.58.1-1.module+el8.6.0+14021+586eff1a.aarch64", "product_id": "rust-std-static-wasm32-wasi-0:1.58.1-1.module+el8.6.0+14021+586eff1a.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rust-std-static-wasm32-wasi@1.58.1-1.module%2Bel8.6.0%2B14021%2B586eff1a?arch=aarch64" } } }, { "category": "product_version", "name": "rust-toolset-0:1.58.1-1.module+el8.6.0+14021+586eff1a.aarch64", "product": { "name": "rust-toolset-0:1.58.1-1.module+el8.6.0+14021+586eff1a.aarch64", "product_id": "rust-toolset-0:1.58.1-1.module+el8.6.0+14021+586eff1a.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rust-toolset@1.58.1-1.module%2Bel8.6.0%2B14021%2B586eff1a?arch=aarch64" } } }, { "category": "product_version", "name": "rustfmt-0:1.58.1-1.module+el8.6.0+14021+586eff1a.aarch64", "product": { "name": "rustfmt-0:1.58.1-1.module+el8.6.0+14021+586eff1a.aarch64", "product_id": "rustfmt-0:1.58.1-1.module+el8.6.0+14021+586eff1a.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rustfmt@1.58.1-1.module%2Bel8.6.0%2B14021%2B586eff1a?arch=aarch64" } } }, { "category": "product_version", "name": "rustfmt-debuginfo-0:1.58.1-1.module+el8.6.0+14021+586eff1a.aarch64", "product": { "name": "rustfmt-debuginfo-0:1.58.1-1.module+el8.6.0+14021+586eff1a.aarch64", "product_id": "rustfmt-debuginfo-0:1.58.1-1.module+el8.6.0+14021+586eff1a.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rustfmt-debuginfo@1.58.1-1.module%2Bel8.6.0%2B14021%2B586eff1a?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "rust-0:1.58.1-1.module+el8.6.0+14021+586eff1a.src", "product": { "name": "rust-0:1.58.1-1.module+el8.6.0+14021+586eff1a.src", "product_id": "rust-0:1.58.1-1.module+el8.6.0+14021+586eff1a.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/rust@1.58.1-1.module%2Bel8.6.0%2B14021%2B586eff1a?arch=src" } } }, { "category": "product_version", "name": "rust-toolset-0:1.58.1-1.module+el8.6.0+14021+586eff1a.src", "product": { "name": "rust-toolset-0:1.58.1-1.module+el8.6.0+14021+586eff1a.src", "product_id": "rust-toolset-0:1.58.1-1.module+el8.6.0+14021+586eff1a.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/rust-toolset@1.58.1-1.module%2Bel8.6.0%2B14021%2B586eff1a?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "cargo-0:1.58.1-1.module+el8.6.0+14021+586eff1a.ppc64le", "product": { "name": "cargo-0:1.58.1-1.module+el8.6.0+14021+586eff1a.ppc64le", "product_id": "cargo-0:1.58.1-1.module+el8.6.0+14021+586eff1a.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/cargo@1.58.1-1.module%2Bel8.6.0%2B14021%2B586eff1a?arch=ppc64le" } } }, { "category": "product_version", "name": "cargo-debuginfo-0:1.58.1-1.module+el8.6.0+14021+586eff1a.ppc64le", "product": { "name": "cargo-debuginfo-0:1.58.1-1.module+el8.6.0+14021+586eff1a.ppc64le", "product_id": "cargo-debuginfo-0:1.58.1-1.module+el8.6.0+14021+586eff1a.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/cargo-debuginfo@1.58.1-1.module%2Bel8.6.0%2B14021%2B586eff1a?arch=ppc64le" } } }, { "category": "product_version", "name": "clippy-0:1.58.1-1.module+el8.6.0+14021+586eff1a.ppc64le", "product": { "name": "clippy-0:1.58.1-1.module+el8.6.0+14021+586eff1a.ppc64le", "product_id": "clippy-0:1.58.1-1.module+el8.6.0+14021+586eff1a.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/clippy@1.58.1-1.module%2Bel8.6.0%2B14021%2B586eff1a?arch=ppc64le" } } }, { "category": "product_version", "name": "clippy-debuginfo-0:1.58.1-1.module+el8.6.0+14021+586eff1a.ppc64le", "product": { "name": "clippy-debuginfo-0:1.58.1-1.module+el8.6.0+14021+586eff1a.ppc64le", "product_id": "clippy-debuginfo-0:1.58.1-1.module+el8.6.0+14021+586eff1a.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/clippy-debuginfo@1.58.1-1.module%2Bel8.6.0%2B14021%2B586eff1a?arch=ppc64le" } } }, { "category": "product_version", "name": "rls-0:1.58.1-1.module+el8.6.0+14021+586eff1a.ppc64le", "product": { "name": "rls-0:1.58.1-1.module+el8.6.0+14021+586eff1a.ppc64le", "product_id": "rls-0:1.58.1-1.module+el8.6.0+14021+586eff1a.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/rls@1.58.1-1.module%2Bel8.6.0%2B14021%2B586eff1a?arch=ppc64le" } } }, { "category": "product_version", "name": "rls-debuginfo-0:1.58.1-1.module+el8.6.0+14021+586eff1a.ppc64le", "product": { "name": "rls-debuginfo-0:1.58.1-1.module+el8.6.0+14021+586eff1a.ppc64le", "product_id": "rls-debuginfo-0:1.58.1-1.module+el8.6.0+14021+586eff1a.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/rls-debuginfo@1.58.1-1.module%2Bel8.6.0%2B14021%2B586eff1a?arch=ppc64le" } } }, { "category": "product_version", "name": "rust-0:1.58.1-1.module+el8.6.0+14021+586eff1a.ppc64le", "product": { "name": "rust-0:1.58.1-1.module+el8.6.0+14021+586eff1a.ppc64le", "product_id": "rust-0:1.58.1-1.module+el8.6.0+14021+586eff1a.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/rust@1.58.1-1.module%2Bel8.6.0%2B14021%2B586eff1a?arch=ppc64le" } } }, { "category": "product_version", "name": "rust-analysis-0:1.58.1-1.module+el8.6.0+14021+586eff1a.ppc64le", "product": { "name": "rust-analysis-0:1.58.1-1.module+el8.6.0+14021+586eff1a.ppc64le", "product_id": "rust-analysis-0:1.58.1-1.module+el8.6.0+14021+586eff1a.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/rust-analysis@1.58.1-1.module%2Bel8.6.0%2B14021%2B586eff1a?arch=ppc64le" } } }, { "category": "product_version", "name": "rust-debuginfo-0:1.58.1-1.module+el8.6.0+14021+586eff1a.ppc64le", "product": { "name": "rust-debuginfo-0:1.58.1-1.module+el8.6.0+14021+586eff1a.ppc64le", "product_id": "rust-debuginfo-0:1.58.1-1.module+el8.6.0+14021+586eff1a.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/rust-debuginfo@1.58.1-1.module%2Bel8.6.0%2B14021%2B586eff1a?arch=ppc64le" } } }, { "category": "product_version", "name": "rust-debugsource-0:1.58.1-1.module+el8.6.0+14021+586eff1a.ppc64le", "product": { "name": "rust-debugsource-0:1.58.1-1.module+el8.6.0+14021+586eff1a.ppc64le", "product_id": "rust-debugsource-0:1.58.1-1.module+el8.6.0+14021+586eff1a.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/rust-debugsource@1.58.1-1.module%2Bel8.6.0%2B14021%2B586eff1a?arch=ppc64le" } } }, { "category": "product_version", "name": "rust-doc-0:1.58.1-1.module+el8.6.0+14021+586eff1a.ppc64le", "product": { "name": "rust-doc-0:1.58.1-1.module+el8.6.0+14021+586eff1a.ppc64le", "product_id": "rust-doc-0:1.58.1-1.module+el8.6.0+14021+586eff1a.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/rust-doc@1.58.1-1.module%2Bel8.6.0%2B14021%2B586eff1a?arch=ppc64le" } } }, { "category": "product_version", "name": "rust-std-static-0:1.58.1-1.module+el8.6.0+14021+586eff1a.ppc64le", "product": { "name": "rust-std-static-0:1.58.1-1.module+el8.6.0+14021+586eff1a.ppc64le", "product_id": "rust-std-static-0:1.58.1-1.module+el8.6.0+14021+586eff1a.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/rust-std-static@1.58.1-1.module%2Bel8.6.0%2B14021%2B586eff1a?arch=ppc64le" } } }, { "category": "product_version", "name": "rust-std-static-wasm32-unknown-unknown-0:1.58.1-1.module+el8.6.0+14021+586eff1a.ppc64le", "product": { "name": "rust-std-static-wasm32-unknown-unknown-0:1.58.1-1.module+el8.6.0+14021+586eff1a.ppc64le", "product_id": "rust-std-static-wasm32-unknown-unknown-0:1.58.1-1.module+el8.6.0+14021+586eff1a.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/rust-std-static-wasm32-unknown-unknown@1.58.1-1.module%2Bel8.6.0%2B14021%2B586eff1a?arch=ppc64le" } } }, { "category": "product_version", "name": "rust-std-static-wasm32-wasi-0:1.58.1-1.module+el8.6.0+14021+586eff1a.ppc64le", "product": { "name": "rust-std-static-wasm32-wasi-0:1.58.1-1.module+el8.6.0+14021+586eff1a.ppc64le", "product_id": "rust-std-static-wasm32-wasi-0:1.58.1-1.module+el8.6.0+14021+586eff1a.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/rust-std-static-wasm32-wasi@1.58.1-1.module%2Bel8.6.0%2B14021%2B586eff1a?arch=ppc64le" } } }, { "category": "product_version", "name": "rust-toolset-0:1.58.1-1.module+el8.6.0+14021+586eff1a.ppc64le", "product": { "name": "rust-toolset-0:1.58.1-1.module+el8.6.0+14021+586eff1a.ppc64le", "product_id": "rust-toolset-0:1.58.1-1.module+el8.6.0+14021+586eff1a.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/rust-toolset@1.58.1-1.module%2Bel8.6.0%2B14021%2B586eff1a?arch=ppc64le" } } }, { "category": "product_version", "name": "rustfmt-0:1.58.1-1.module+el8.6.0+14021+586eff1a.ppc64le", "product": { "name": "rustfmt-0:1.58.1-1.module+el8.6.0+14021+586eff1a.ppc64le", "product_id": "rustfmt-0:1.58.1-1.module+el8.6.0+14021+586eff1a.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/rustfmt@1.58.1-1.module%2Bel8.6.0%2B14021%2B586eff1a?arch=ppc64le" } } }, { "category": "product_version", "name": "rustfmt-debuginfo-0:1.58.1-1.module+el8.6.0+14021+586eff1a.ppc64le", "product": { "name": "rustfmt-debuginfo-0:1.58.1-1.module+el8.6.0+14021+586eff1a.ppc64le", "product_id": "rustfmt-debuginfo-0:1.58.1-1.module+el8.6.0+14021+586eff1a.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/rustfmt-debuginfo@1.58.1-1.module%2Bel8.6.0%2B14021%2B586eff1a?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "cargo-0:1.58.1-1.module+el8.6.0+14021+586eff1a.s390x", "product": { "name": "cargo-0:1.58.1-1.module+el8.6.0+14021+586eff1a.s390x", "product_id": "cargo-0:1.58.1-1.module+el8.6.0+14021+586eff1a.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/cargo@1.58.1-1.module%2Bel8.6.0%2B14021%2B586eff1a?arch=s390x" } } }, { "category": "product_version", "name": "cargo-debuginfo-0:1.58.1-1.module+el8.6.0+14021+586eff1a.s390x", "product": { "name": "cargo-debuginfo-0:1.58.1-1.module+el8.6.0+14021+586eff1a.s390x", "product_id": "cargo-debuginfo-0:1.58.1-1.module+el8.6.0+14021+586eff1a.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/cargo-debuginfo@1.58.1-1.module%2Bel8.6.0%2B14021%2B586eff1a?arch=s390x" } } }, { "category": "product_version", "name": "clippy-0:1.58.1-1.module+el8.6.0+14021+586eff1a.s390x", "product": { "name": "clippy-0:1.58.1-1.module+el8.6.0+14021+586eff1a.s390x", "product_id": "clippy-0:1.58.1-1.module+el8.6.0+14021+586eff1a.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/clippy@1.58.1-1.module%2Bel8.6.0%2B14021%2B586eff1a?arch=s390x" } } }, { "category": "product_version", "name": "clippy-debuginfo-0:1.58.1-1.module+el8.6.0+14021+586eff1a.s390x", "product": { "name": "clippy-debuginfo-0:1.58.1-1.module+el8.6.0+14021+586eff1a.s390x", "product_id": "clippy-debuginfo-0:1.58.1-1.module+el8.6.0+14021+586eff1a.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/clippy-debuginfo@1.58.1-1.module%2Bel8.6.0%2B14021%2B586eff1a?arch=s390x" } } }, { "category": "product_version", "name": "rls-0:1.58.1-1.module+el8.6.0+14021+586eff1a.s390x", "product": { "name": "rls-0:1.58.1-1.module+el8.6.0+14021+586eff1a.s390x", "product_id": "rls-0:1.58.1-1.module+el8.6.0+14021+586eff1a.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/rls@1.58.1-1.module%2Bel8.6.0%2B14021%2B586eff1a?arch=s390x" } } }, { "category": "product_version", "name": "rls-debuginfo-0:1.58.1-1.module+el8.6.0+14021+586eff1a.s390x", "product": { "name": "rls-debuginfo-0:1.58.1-1.module+el8.6.0+14021+586eff1a.s390x", "product_id": "rls-debuginfo-0:1.58.1-1.module+el8.6.0+14021+586eff1a.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/rls-debuginfo@1.58.1-1.module%2Bel8.6.0%2B14021%2B586eff1a?arch=s390x" } } }, { "category": "product_version", "name": "rust-0:1.58.1-1.module+el8.6.0+14021+586eff1a.s390x", "product": { "name": "rust-0:1.58.1-1.module+el8.6.0+14021+586eff1a.s390x", "product_id": "rust-0:1.58.1-1.module+el8.6.0+14021+586eff1a.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/rust@1.58.1-1.module%2Bel8.6.0%2B14021%2B586eff1a?arch=s390x" } } }, { "category": "product_version", "name": "rust-analysis-0:1.58.1-1.module+el8.6.0+14021+586eff1a.s390x", "product": { "name": "rust-analysis-0:1.58.1-1.module+el8.6.0+14021+586eff1a.s390x", "product_id": "rust-analysis-0:1.58.1-1.module+el8.6.0+14021+586eff1a.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/rust-analysis@1.58.1-1.module%2Bel8.6.0%2B14021%2B586eff1a?arch=s390x" } } }, { "category": "product_version", "name": "rust-debuginfo-0:1.58.1-1.module+el8.6.0+14021+586eff1a.s390x", "product": { "name": "rust-debuginfo-0:1.58.1-1.module+el8.6.0+14021+586eff1a.s390x", "product_id": "rust-debuginfo-0:1.58.1-1.module+el8.6.0+14021+586eff1a.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/rust-debuginfo@1.58.1-1.module%2Bel8.6.0%2B14021%2B586eff1a?arch=s390x" } } }, { "category": "product_version", "name": "rust-debugsource-0:1.58.1-1.module+el8.6.0+14021+586eff1a.s390x", "product": { "name": "rust-debugsource-0:1.58.1-1.module+el8.6.0+14021+586eff1a.s390x", "product_id": "rust-debugsource-0:1.58.1-1.module+el8.6.0+14021+586eff1a.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/rust-debugsource@1.58.1-1.module%2Bel8.6.0%2B14021%2B586eff1a?arch=s390x" } } }, { "category": "product_version", "name": "rust-doc-0:1.58.1-1.module+el8.6.0+14021+586eff1a.s390x", "product": { "name": "rust-doc-0:1.58.1-1.module+el8.6.0+14021+586eff1a.s390x", "product_id": "rust-doc-0:1.58.1-1.module+el8.6.0+14021+586eff1a.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/rust-doc@1.58.1-1.module%2Bel8.6.0%2B14021%2B586eff1a?arch=s390x" } } }, { "category": "product_version", "name": "rust-std-static-0:1.58.1-1.module+el8.6.0+14021+586eff1a.s390x", "product": { "name": "rust-std-static-0:1.58.1-1.module+el8.6.0+14021+586eff1a.s390x", "product_id": "rust-std-static-0:1.58.1-1.module+el8.6.0+14021+586eff1a.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/rust-std-static@1.58.1-1.module%2Bel8.6.0%2B14021%2B586eff1a?arch=s390x" } } }, { "category": "product_version", "name": "rust-toolset-0:1.58.1-1.module+el8.6.0+14021+586eff1a.s390x", "product": { "name": "rust-toolset-0:1.58.1-1.module+el8.6.0+14021+586eff1a.s390x", "product_id": "rust-toolset-0:1.58.1-1.module+el8.6.0+14021+586eff1a.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/rust-toolset@1.58.1-1.module%2Bel8.6.0%2B14021%2B586eff1a?arch=s390x" } } }, { "category": "product_version", "name": "rustfmt-0:1.58.1-1.module+el8.6.0+14021+586eff1a.s390x", "product": { "name": "rustfmt-0:1.58.1-1.module+el8.6.0+14021+586eff1a.s390x", "product_id": "rustfmt-0:1.58.1-1.module+el8.6.0+14021+586eff1a.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/rustfmt@1.58.1-1.module%2Bel8.6.0%2B14021%2B586eff1a?arch=s390x" } } }, { "category": "product_version", "name": "rustfmt-debuginfo-0:1.58.1-1.module+el8.6.0+14021+586eff1a.s390x", "product": { "name": "rustfmt-debuginfo-0:1.58.1-1.module+el8.6.0+14021+586eff1a.s390x", "product_id": "rustfmt-debuginfo-0:1.58.1-1.module+el8.6.0+14021+586eff1a.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/rustfmt-debuginfo@1.58.1-1.module%2Bel8.6.0%2B14021%2B586eff1a?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "cargo-0:1.58.1-1.module+el8.6.0+14021+586eff1a.x86_64", "product": { "name": "cargo-0:1.58.1-1.module+el8.6.0+14021+586eff1a.x86_64", "product_id": "cargo-0:1.58.1-1.module+el8.6.0+14021+586eff1a.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cargo@1.58.1-1.module%2Bel8.6.0%2B14021%2B586eff1a?arch=x86_64" } } }, { "category": "product_version", "name": "cargo-debuginfo-0:1.58.1-1.module+el8.6.0+14021+586eff1a.x86_64", "product": { "name": "cargo-debuginfo-0:1.58.1-1.module+el8.6.0+14021+586eff1a.x86_64", "product_id": "cargo-debuginfo-0:1.58.1-1.module+el8.6.0+14021+586eff1a.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cargo-debuginfo@1.58.1-1.module%2Bel8.6.0%2B14021%2B586eff1a?arch=x86_64" } } }, { "category": "product_version", "name": "clippy-0:1.58.1-1.module+el8.6.0+14021+586eff1a.x86_64", "product": { "name": "clippy-0:1.58.1-1.module+el8.6.0+14021+586eff1a.x86_64", "product_id": "clippy-0:1.58.1-1.module+el8.6.0+14021+586eff1a.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/clippy@1.58.1-1.module%2Bel8.6.0%2B14021%2B586eff1a?arch=x86_64" } } }, { "category": "product_version", "name": "clippy-debuginfo-0:1.58.1-1.module+el8.6.0+14021+586eff1a.x86_64", "product": { "name": "clippy-debuginfo-0:1.58.1-1.module+el8.6.0+14021+586eff1a.x86_64", "product_id": "clippy-debuginfo-0:1.58.1-1.module+el8.6.0+14021+586eff1a.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/clippy-debuginfo@1.58.1-1.module%2Bel8.6.0%2B14021%2B586eff1a?arch=x86_64" } } }, { "category": "product_version", "name": "rls-0:1.58.1-1.module+el8.6.0+14021+586eff1a.x86_64", "product": { "name": "rls-0:1.58.1-1.module+el8.6.0+14021+586eff1a.x86_64", "product_id": "rls-0:1.58.1-1.module+el8.6.0+14021+586eff1a.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rls@1.58.1-1.module%2Bel8.6.0%2B14021%2B586eff1a?arch=x86_64" } } }, { "category": "product_version", "name": "rls-debuginfo-0:1.58.1-1.module+el8.6.0+14021+586eff1a.x86_64", "product": { "name": "rls-debuginfo-0:1.58.1-1.module+el8.6.0+14021+586eff1a.x86_64", "product_id": "rls-debuginfo-0:1.58.1-1.module+el8.6.0+14021+586eff1a.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rls-debuginfo@1.58.1-1.module%2Bel8.6.0%2B14021%2B586eff1a?arch=x86_64" } } }, { "category": "product_version", "name": "rust-0:1.58.1-1.module+el8.6.0+14021+586eff1a.x86_64", "product": { "name": "rust-0:1.58.1-1.module+el8.6.0+14021+586eff1a.x86_64", "product_id": "rust-0:1.58.1-1.module+el8.6.0+14021+586eff1a.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rust@1.58.1-1.module%2Bel8.6.0%2B14021%2B586eff1a?arch=x86_64" } } }, { "category": "product_version", "name": "rust-analysis-0:1.58.1-1.module+el8.6.0+14021+586eff1a.x86_64", "product": { "name": "rust-analysis-0:1.58.1-1.module+el8.6.0+14021+586eff1a.x86_64", "product_id": "rust-analysis-0:1.58.1-1.module+el8.6.0+14021+586eff1a.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rust-analysis@1.58.1-1.module%2Bel8.6.0%2B14021%2B586eff1a?arch=x86_64" } } }, { "category": "product_version", "name": "rust-debuginfo-0:1.58.1-1.module+el8.6.0+14021+586eff1a.x86_64", "product": { "name": "rust-debuginfo-0:1.58.1-1.module+el8.6.0+14021+586eff1a.x86_64", "product_id": "rust-debuginfo-0:1.58.1-1.module+el8.6.0+14021+586eff1a.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rust-debuginfo@1.58.1-1.module%2Bel8.6.0%2B14021%2B586eff1a?arch=x86_64" } } }, { "category": "product_version", "name": "rust-debugsource-0:1.58.1-1.module+el8.6.0+14021+586eff1a.x86_64", "product": { "name": "rust-debugsource-0:1.58.1-1.module+el8.6.0+14021+586eff1a.x86_64", "product_id": "rust-debugsource-0:1.58.1-1.module+el8.6.0+14021+586eff1a.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rust-debugsource@1.58.1-1.module%2Bel8.6.0%2B14021%2B586eff1a?arch=x86_64" } } }, { "category": "product_version", "name": "rust-doc-0:1.58.1-1.module+el8.6.0+14021+586eff1a.x86_64", "product": { "name": "rust-doc-0:1.58.1-1.module+el8.6.0+14021+586eff1a.x86_64", "product_id": "rust-doc-0:1.58.1-1.module+el8.6.0+14021+586eff1a.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rust-doc@1.58.1-1.module%2Bel8.6.0%2B14021%2B586eff1a?arch=x86_64" } } }, { "category": "product_version", "name": "rust-std-static-0:1.58.1-1.module+el8.6.0+14021+586eff1a.x86_64", "product": { "name": "rust-std-static-0:1.58.1-1.module+el8.6.0+14021+586eff1a.x86_64", "product_id": "rust-std-static-0:1.58.1-1.module+el8.6.0+14021+586eff1a.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rust-std-static@1.58.1-1.module%2Bel8.6.0%2B14021%2B586eff1a?arch=x86_64" } } }, { "category": "product_version", "name": "rust-std-static-wasm32-unknown-unknown-0:1.58.1-1.module+el8.6.0+14021+586eff1a.x86_64", "product": { "name": "rust-std-static-wasm32-unknown-unknown-0:1.58.1-1.module+el8.6.0+14021+586eff1a.x86_64", "product_id": "rust-std-static-wasm32-unknown-unknown-0:1.58.1-1.module+el8.6.0+14021+586eff1a.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rust-std-static-wasm32-unknown-unknown@1.58.1-1.module%2Bel8.6.0%2B14021%2B586eff1a?arch=x86_64" } } }, { "category": "product_version", "name": "rust-std-static-wasm32-wasi-0:1.58.1-1.module+el8.6.0+14021+586eff1a.x86_64", "product": { "name": "rust-std-static-wasm32-wasi-0:1.58.1-1.module+el8.6.0+14021+586eff1a.x86_64", "product_id": "rust-std-static-wasm32-wasi-0:1.58.1-1.module+el8.6.0+14021+586eff1a.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rust-std-static-wasm32-wasi@1.58.1-1.module%2Bel8.6.0%2B14021%2B586eff1a?arch=x86_64" } } }, { "category": "product_version", "name": "rust-toolset-0:1.58.1-1.module+el8.6.0+14021+586eff1a.x86_64", "product": { "name": "rust-toolset-0:1.58.1-1.module+el8.6.0+14021+586eff1a.x86_64", "product_id": "rust-toolset-0:1.58.1-1.module+el8.6.0+14021+586eff1a.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rust-toolset@1.58.1-1.module%2Bel8.6.0%2B14021%2B586eff1a?arch=x86_64" } } }, { "category": "product_version", "name": "rustfmt-0:1.58.1-1.module+el8.6.0+14021+586eff1a.x86_64", "product": { "name": "rustfmt-0:1.58.1-1.module+el8.6.0+14021+586eff1a.x86_64", "product_id": "rustfmt-0:1.58.1-1.module+el8.6.0+14021+586eff1a.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rustfmt@1.58.1-1.module%2Bel8.6.0%2B14021%2B586eff1a?arch=x86_64" } } }, { "category": "product_version", "name": "rustfmt-debuginfo-0:1.58.1-1.module+el8.6.0+14021+586eff1a.x86_64", "product": { "name": "rustfmt-debuginfo-0:1.58.1-1.module+el8.6.0+14021+586eff1a.x86_64", "product_id": "rustfmt-debuginfo-0:1.58.1-1.module+el8.6.0+14021+586eff1a.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rustfmt-debuginfo@1.58.1-1.module%2Bel8.6.0%2B14021%2B586eff1a?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "rust-toolset:rhel8:8060020220125235043:eab6f2ea as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea" }, "product_reference": "rust-toolset:rhel8:8060020220125235043:eab6f2ea", "relates_to_product_reference": "AppStream-8.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "cargo-0:1.58.1-1.module+el8.6.0+14021+586eff1a.aarch64 as a component of rust-toolset:rhel8:8060020220125235043:eab6f2ea as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:cargo-0:1.58.1-1.module+el8.6.0+14021+586eff1a.aarch64" }, "product_reference": "cargo-0:1.58.1-1.module+el8.6.0+14021+586eff1a.aarch64", "relates_to_product_reference": "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea" }, { "category": "default_component_of", "full_product_name": { "name": "cargo-0:1.58.1-1.module+el8.6.0+14021+586eff1a.ppc64le as a component of rust-toolset:rhel8:8060020220125235043:eab6f2ea as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:cargo-0:1.58.1-1.module+el8.6.0+14021+586eff1a.ppc64le" }, "product_reference": "cargo-0:1.58.1-1.module+el8.6.0+14021+586eff1a.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea" }, { "category": "default_component_of", "full_product_name": { "name": "cargo-0:1.58.1-1.module+el8.6.0+14021+586eff1a.s390x as a component of rust-toolset:rhel8:8060020220125235043:eab6f2ea as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:cargo-0:1.58.1-1.module+el8.6.0+14021+586eff1a.s390x" }, "product_reference": "cargo-0:1.58.1-1.module+el8.6.0+14021+586eff1a.s390x", "relates_to_product_reference": "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea" }, { "category": "default_component_of", "full_product_name": { "name": "cargo-0:1.58.1-1.module+el8.6.0+14021+586eff1a.x86_64 as a component of rust-toolset:rhel8:8060020220125235043:eab6f2ea as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:cargo-0:1.58.1-1.module+el8.6.0+14021+586eff1a.x86_64" }, "product_reference": "cargo-0:1.58.1-1.module+el8.6.0+14021+586eff1a.x86_64", "relates_to_product_reference": "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea" }, { "category": "default_component_of", "full_product_name": { "name": "cargo-debuginfo-0:1.58.1-1.module+el8.6.0+14021+586eff1a.aarch64 as a component of rust-toolset:rhel8:8060020220125235043:eab6f2ea as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:cargo-debuginfo-0:1.58.1-1.module+el8.6.0+14021+586eff1a.aarch64" }, "product_reference": "cargo-debuginfo-0:1.58.1-1.module+el8.6.0+14021+586eff1a.aarch64", "relates_to_product_reference": "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea" }, { "category": "default_component_of", "full_product_name": { "name": "cargo-debuginfo-0:1.58.1-1.module+el8.6.0+14021+586eff1a.ppc64le as a component of rust-toolset:rhel8:8060020220125235043:eab6f2ea as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:cargo-debuginfo-0:1.58.1-1.module+el8.6.0+14021+586eff1a.ppc64le" }, "product_reference": "cargo-debuginfo-0:1.58.1-1.module+el8.6.0+14021+586eff1a.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea" }, { "category": "default_component_of", "full_product_name": { "name": "cargo-debuginfo-0:1.58.1-1.module+el8.6.0+14021+586eff1a.s390x as a component of rust-toolset:rhel8:8060020220125235043:eab6f2ea as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:cargo-debuginfo-0:1.58.1-1.module+el8.6.0+14021+586eff1a.s390x" }, "product_reference": "cargo-debuginfo-0:1.58.1-1.module+el8.6.0+14021+586eff1a.s390x", "relates_to_product_reference": "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea" }, { "category": "default_component_of", "full_product_name": { "name": "cargo-debuginfo-0:1.58.1-1.module+el8.6.0+14021+586eff1a.x86_64 as a component of rust-toolset:rhel8:8060020220125235043:eab6f2ea as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:cargo-debuginfo-0:1.58.1-1.module+el8.6.0+14021+586eff1a.x86_64" }, "product_reference": "cargo-debuginfo-0:1.58.1-1.module+el8.6.0+14021+586eff1a.x86_64", "relates_to_product_reference": "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea" }, { "category": "default_component_of", "full_product_name": { "name": "cargo-doc-0:1.58.1-1.module+el8.6.0+14021+586eff1a.noarch as a component of rust-toolset:rhel8:8060020220125235043:eab6f2ea as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:cargo-doc-0:1.58.1-1.module+el8.6.0+14021+586eff1a.noarch" }, "product_reference": "cargo-doc-0:1.58.1-1.module+el8.6.0+14021+586eff1a.noarch", "relates_to_product_reference": "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea" }, { "category": "default_component_of", "full_product_name": { "name": "clippy-0:1.58.1-1.module+el8.6.0+14021+586eff1a.aarch64 as a component of rust-toolset:rhel8:8060020220125235043:eab6f2ea as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:clippy-0:1.58.1-1.module+el8.6.0+14021+586eff1a.aarch64" }, "product_reference": "clippy-0:1.58.1-1.module+el8.6.0+14021+586eff1a.aarch64", "relates_to_product_reference": "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea" }, { "category": "default_component_of", "full_product_name": { "name": "clippy-0:1.58.1-1.module+el8.6.0+14021+586eff1a.ppc64le as a component of rust-toolset:rhel8:8060020220125235043:eab6f2ea as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:clippy-0:1.58.1-1.module+el8.6.0+14021+586eff1a.ppc64le" }, "product_reference": "clippy-0:1.58.1-1.module+el8.6.0+14021+586eff1a.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea" }, { "category": "default_component_of", "full_product_name": { "name": "clippy-0:1.58.1-1.module+el8.6.0+14021+586eff1a.s390x as a component of rust-toolset:rhel8:8060020220125235043:eab6f2ea as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:clippy-0:1.58.1-1.module+el8.6.0+14021+586eff1a.s390x" }, "product_reference": "clippy-0:1.58.1-1.module+el8.6.0+14021+586eff1a.s390x", "relates_to_product_reference": "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea" }, { "category": "default_component_of", "full_product_name": { "name": "clippy-0:1.58.1-1.module+el8.6.0+14021+586eff1a.x86_64 as a component of rust-toolset:rhel8:8060020220125235043:eab6f2ea as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:clippy-0:1.58.1-1.module+el8.6.0+14021+586eff1a.x86_64" }, "product_reference": "clippy-0:1.58.1-1.module+el8.6.0+14021+586eff1a.x86_64", "relates_to_product_reference": "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea" }, { "category": "default_component_of", "full_product_name": { "name": "clippy-debuginfo-0:1.58.1-1.module+el8.6.0+14021+586eff1a.aarch64 as a component of rust-toolset:rhel8:8060020220125235043:eab6f2ea as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:clippy-debuginfo-0:1.58.1-1.module+el8.6.0+14021+586eff1a.aarch64" }, "product_reference": "clippy-debuginfo-0:1.58.1-1.module+el8.6.0+14021+586eff1a.aarch64", "relates_to_product_reference": "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea" }, { "category": "default_component_of", "full_product_name": { "name": "clippy-debuginfo-0:1.58.1-1.module+el8.6.0+14021+586eff1a.ppc64le as a component of rust-toolset:rhel8:8060020220125235043:eab6f2ea as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:clippy-debuginfo-0:1.58.1-1.module+el8.6.0+14021+586eff1a.ppc64le" }, "product_reference": "clippy-debuginfo-0:1.58.1-1.module+el8.6.0+14021+586eff1a.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea" }, { "category": "default_component_of", "full_product_name": { "name": "clippy-debuginfo-0:1.58.1-1.module+el8.6.0+14021+586eff1a.s390x as a component of rust-toolset:rhel8:8060020220125235043:eab6f2ea as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:clippy-debuginfo-0:1.58.1-1.module+el8.6.0+14021+586eff1a.s390x" }, "product_reference": "clippy-debuginfo-0:1.58.1-1.module+el8.6.0+14021+586eff1a.s390x", "relates_to_product_reference": "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea" }, { "category": "default_component_of", "full_product_name": { "name": "clippy-debuginfo-0:1.58.1-1.module+el8.6.0+14021+586eff1a.x86_64 as a component of rust-toolset:rhel8:8060020220125235043:eab6f2ea as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:clippy-debuginfo-0:1.58.1-1.module+el8.6.0+14021+586eff1a.x86_64" }, "product_reference": "clippy-debuginfo-0:1.58.1-1.module+el8.6.0+14021+586eff1a.x86_64", "relates_to_product_reference": "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea" }, { "category": "default_component_of", "full_product_name": { "name": "rls-0:1.58.1-1.module+el8.6.0+14021+586eff1a.aarch64 as a component of rust-toolset:rhel8:8060020220125235043:eab6f2ea as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rls-0:1.58.1-1.module+el8.6.0+14021+586eff1a.aarch64" }, "product_reference": "rls-0:1.58.1-1.module+el8.6.0+14021+586eff1a.aarch64", "relates_to_product_reference": "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea" }, { "category": "default_component_of", "full_product_name": { "name": "rls-0:1.58.1-1.module+el8.6.0+14021+586eff1a.ppc64le as a component of rust-toolset:rhel8:8060020220125235043:eab6f2ea as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rls-0:1.58.1-1.module+el8.6.0+14021+586eff1a.ppc64le" }, "product_reference": "rls-0:1.58.1-1.module+el8.6.0+14021+586eff1a.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea" }, { "category": "default_component_of", "full_product_name": { "name": "rls-0:1.58.1-1.module+el8.6.0+14021+586eff1a.s390x as a component of rust-toolset:rhel8:8060020220125235043:eab6f2ea as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rls-0:1.58.1-1.module+el8.6.0+14021+586eff1a.s390x" }, "product_reference": "rls-0:1.58.1-1.module+el8.6.0+14021+586eff1a.s390x", "relates_to_product_reference": "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea" }, { "category": "default_component_of", "full_product_name": { "name": "rls-0:1.58.1-1.module+el8.6.0+14021+586eff1a.x86_64 as a component of rust-toolset:rhel8:8060020220125235043:eab6f2ea as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rls-0:1.58.1-1.module+el8.6.0+14021+586eff1a.x86_64" }, "product_reference": "rls-0:1.58.1-1.module+el8.6.0+14021+586eff1a.x86_64", "relates_to_product_reference": "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea" }, { "category": "default_component_of", "full_product_name": { "name": "rls-debuginfo-0:1.58.1-1.module+el8.6.0+14021+586eff1a.aarch64 as a component of rust-toolset:rhel8:8060020220125235043:eab6f2ea as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rls-debuginfo-0:1.58.1-1.module+el8.6.0+14021+586eff1a.aarch64" }, "product_reference": "rls-debuginfo-0:1.58.1-1.module+el8.6.0+14021+586eff1a.aarch64", "relates_to_product_reference": "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea" }, { "category": "default_component_of", "full_product_name": { "name": "rls-debuginfo-0:1.58.1-1.module+el8.6.0+14021+586eff1a.ppc64le as a component of rust-toolset:rhel8:8060020220125235043:eab6f2ea as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rls-debuginfo-0:1.58.1-1.module+el8.6.0+14021+586eff1a.ppc64le" }, "product_reference": "rls-debuginfo-0:1.58.1-1.module+el8.6.0+14021+586eff1a.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea" }, { "category": "default_component_of", "full_product_name": { "name": "rls-debuginfo-0:1.58.1-1.module+el8.6.0+14021+586eff1a.s390x as a component of rust-toolset:rhel8:8060020220125235043:eab6f2ea as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rls-debuginfo-0:1.58.1-1.module+el8.6.0+14021+586eff1a.s390x" }, "product_reference": "rls-debuginfo-0:1.58.1-1.module+el8.6.0+14021+586eff1a.s390x", "relates_to_product_reference": "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea" }, { "category": "default_component_of", "full_product_name": { "name": "rls-debuginfo-0:1.58.1-1.module+el8.6.0+14021+586eff1a.x86_64 as a component of rust-toolset:rhel8:8060020220125235043:eab6f2ea as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rls-debuginfo-0:1.58.1-1.module+el8.6.0+14021+586eff1a.x86_64" }, "product_reference": "rls-debuginfo-0:1.58.1-1.module+el8.6.0+14021+586eff1a.x86_64", "relates_to_product_reference": "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea" }, { "category": "default_component_of", "full_product_name": { "name": "rust-0:1.58.1-1.module+el8.6.0+14021+586eff1a.aarch64 as a component of rust-toolset:rhel8:8060020220125235043:eab6f2ea as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rust-0:1.58.1-1.module+el8.6.0+14021+586eff1a.aarch64" }, "product_reference": "rust-0:1.58.1-1.module+el8.6.0+14021+586eff1a.aarch64", "relates_to_product_reference": "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea" }, { "category": "default_component_of", "full_product_name": { "name": "rust-0:1.58.1-1.module+el8.6.0+14021+586eff1a.ppc64le as a component of rust-toolset:rhel8:8060020220125235043:eab6f2ea as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rust-0:1.58.1-1.module+el8.6.0+14021+586eff1a.ppc64le" }, "product_reference": "rust-0:1.58.1-1.module+el8.6.0+14021+586eff1a.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea" }, { "category": "default_component_of", "full_product_name": { "name": "rust-0:1.58.1-1.module+el8.6.0+14021+586eff1a.s390x as a component of rust-toolset:rhel8:8060020220125235043:eab6f2ea as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rust-0:1.58.1-1.module+el8.6.0+14021+586eff1a.s390x" }, "product_reference": "rust-0:1.58.1-1.module+el8.6.0+14021+586eff1a.s390x", "relates_to_product_reference": "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea" }, { "category": "default_component_of", "full_product_name": { "name": "rust-0:1.58.1-1.module+el8.6.0+14021+586eff1a.src as a component of rust-toolset:rhel8:8060020220125235043:eab6f2ea as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rust-0:1.58.1-1.module+el8.6.0+14021+586eff1a.src" }, "product_reference": "rust-0:1.58.1-1.module+el8.6.0+14021+586eff1a.src", "relates_to_product_reference": "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea" }, { "category": "default_component_of", "full_product_name": { "name": "rust-0:1.58.1-1.module+el8.6.0+14021+586eff1a.x86_64 as a component of rust-toolset:rhel8:8060020220125235043:eab6f2ea as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rust-0:1.58.1-1.module+el8.6.0+14021+586eff1a.x86_64" }, "product_reference": "rust-0:1.58.1-1.module+el8.6.0+14021+586eff1a.x86_64", "relates_to_product_reference": "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea" }, { "category": "default_component_of", "full_product_name": { "name": "rust-analysis-0:1.58.1-1.module+el8.6.0+14021+586eff1a.aarch64 as a component of rust-toolset:rhel8:8060020220125235043:eab6f2ea as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rust-analysis-0:1.58.1-1.module+el8.6.0+14021+586eff1a.aarch64" }, "product_reference": "rust-analysis-0:1.58.1-1.module+el8.6.0+14021+586eff1a.aarch64", "relates_to_product_reference": "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea" }, { "category": "default_component_of", "full_product_name": { "name": "rust-analysis-0:1.58.1-1.module+el8.6.0+14021+586eff1a.ppc64le as a component of rust-toolset:rhel8:8060020220125235043:eab6f2ea as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rust-analysis-0:1.58.1-1.module+el8.6.0+14021+586eff1a.ppc64le" }, "product_reference": "rust-analysis-0:1.58.1-1.module+el8.6.0+14021+586eff1a.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea" }, { "category": "default_component_of", "full_product_name": { "name": "rust-analysis-0:1.58.1-1.module+el8.6.0+14021+586eff1a.s390x as a component of rust-toolset:rhel8:8060020220125235043:eab6f2ea as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rust-analysis-0:1.58.1-1.module+el8.6.0+14021+586eff1a.s390x" }, "product_reference": "rust-analysis-0:1.58.1-1.module+el8.6.0+14021+586eff1a.s390x", "relates_to_product_reference": "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea" }, { "category": "default_component_of", "full_product_name": { "name": "rust-analysis-0:1.58.1-1.module+el8.6.0+14021+586eff1a.x86_64 as a component of rust-toolset:rhel8:8060020220125235043:eab6f2ea as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rust-analysis-0:1.58.1-1.module+el8.6.0+14021+586eff1a.x86_64" }, "product_reference": "rust-analysis-0:1.58.1-1.module+el8.6.0+14021+586eff1a.x86_64", "relates_to_product_reference": "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea" }, { "category": "default_component_of", "full_product_name": { "name": "rust-debugger-common-0:1.58.1-1.module+el8.6.0+14021+586eff1a.noarch as a component of rust-toolset:rhel8:8060020220125235043:eab6f2ea as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rust-debugger-common-0:1.58.1-1.module+el8.6.0+14021+586eff1a.noarch" }, "product_reference": "rust-debugger-common-0:1.58.1-1.module+el8.6.0+14021+586eff1a.noarch", "relates_to_product_reference": "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea" }, { "category": "default_component_of", "full_product_name": { "name": "rust-debuginfo-0:1.58.1-1.module+el8.6.0+14021+586eff1a.aarch64 as a component of rust-toolset:rhel8:8060020220125235043:eab6f2ea as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rust-debuginfo-0:1.58.1-1.module+el8.6.0+14021+586eff1a.aarch64" }, "product_reference": "rust-debuginfo-0:1.58.1-1.module+el8.6.0+14021+586eff1a.aarch64", "relates_to_product_reference": "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea" }, { "category": "default_component_of", "full_product_name": { "name": "rust-debuginfo-0:1.58.1-1.module+el8.6.0+14021+586eff1a.ppc64le as a component of rust-toolset:rhel8:8060020220125235043:eab6f2ea as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rust-debuginfo-0:1.58.1-1.module+el8.6.0+14021+586eff1a.ppc64le" }, "product_reference": "rust-debuginfo-0:1.58.1-1.module+el8.6.0+14021+586eff1a.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea" }, { "category": "default_component_of", "full_product_name": { "name": "rust-debuginfo-0:1.58.1-1.module+el8.6.0+14021+586eff1a.s390x as a component of rust-toolset:rhel8:8060020220125235043:eab6f2ea as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rust-debuginfo-0:1.58.1-1.module+el8.6.0+14021+586eff1a.s390x" }, "product_reference": "rust-debuginfo-0:1.58.1-1.module+el8.6.0+14021+586eff1a.s390x", "relates_to_product_reference": "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea" }, { "category": "default_component_of", "full_product_name": { "name": "rust-debuginfo-0:1.58.1-1.module+el8.6.0+14021+586eff1a.x86_64 as a component of rust-toolset:rhel8:8060020220125235043:eab6f2ea as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rust-debuginfo-0:1.58.1-1.module+el8.6.0+14021+586eff1a.x86_64" }, "product_reference": "rust-debuginfo-0:1.58.1-1.module+el8.6.0+14021+586eff1a.x86_64", "relates_to_product_reference": "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea" }, { "category": "default_component_of", "full_product_name": { "name": "rust-debugsource-0:1.58.1-1.module+el8.6.0+14021+586eff1a.aarch64 as a component of rust-toolset:rhel8:8060020220125235043:eab6f2ea as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rust-debugsource-0:1.58.1-1.module+el8.6.0+14021+586eff1a.aarch64" }, "product_reference": "rust-debugsource-0:1.58.1-1.module+el8.6.0+14021+586eff1a.aarch64", "relates_to_product_reference": "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea" }, { "category": "default_component_of", "full_product_name": { "name": "rust-debugsource-0:1.58.1-1.module+el8.6.0+14021+586eff1a.ppc64le as a component of rust-toolset:rhel8:8060020220125235043:eab6f2ea as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rust-debugsource-0:1.58.1-1.module+el8.6.0+14021+586eff1a.ppc64le" }, "product_reference": "rust-debugsource-0:1.58.1-1.module+el8.6.0+14021+586eff1a.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea" }, { "category": "default_component_of", "full_product_name": { "name": "rust-debugsource-0:1.58.1-1.module+el8.6.0+14021+586eff1a.s390x as a component of rust-toolset:rhel8:8060020220125235043:eab6f2ea as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rust-debugsource-0:1.58.1-1.module+el8.6.0+14021+586eff1a.s390x" }, "product_reference": "rust-debugsource-0:1.58.1-1.module+el8.6.0+14021+586eff1a.s390x", "relates_to_product_reference": "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea" }, { "category": "default_component_of", "full_product_name": { "name": "rust-debugsource-0:1.58.1-1.module+el8.6.0+14021+586eff1a.x86_64 as a component of rust-toolset:rhel8:8060020220125235043:eab6f2ea as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rust-debugsource-0:1.58.1-1.module+el8.6.0+14021+586eff1a.x86_64" }, "product_reference": "rust-debugsource-0:1.58.1-1.module+el8.6.0+14021+586eff1a.x86_64", "relates_to_product_reference": "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea" }, { "category": "default_component_of", "full_product_name": { "name": "rust-doc-0:1.58.1-1.module+el8.6.0+14021+586eff1a.aarch64 as a component of rust-toolset:rhel8:8060020220125235043:eab6f2ea as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rust-doc-0:1.58.1-1.module+el8.6.0+14021+586eff1a.aarch64" }, "product_reference": "rust-doc-0:1.58.1-1.module+el8.6.0+14021+586eff1a.aarch64", "relates_to_product_reference": "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea" }, { "category": "default_component_of", "full_product_name": { "name": "rust-doc-0:1.58.1-1.module+el8.6.0+14021+586eff1a.ppc64le as a component of rust-toolset:rhel8:8060020220125235043:eab6f2ea as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rust-doc-0:1.58.1-1.module+el8.6.0+14021+586eff1a.ppc64le" }, "product_reference": "rust-doc-0:1.58.1-1.module+el8.6.0+14021+586eff1a.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea" }, { "category": "default_component_of", "full_product_name": { "name": "rust-doc-0:1.58.1-1.module+el8.6.0+14021+586eff1a.s390x as a component of rust-toolset:rhel8:8060020220125235043:eab6f2ea as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rust-doc-0:1.58.1-1.module+el8.6.0+14021+586eff1a.s390x" }, "product_reference": "rust-doc-0:1.58.1-1.module+el8.6.0+14021+586eff1a.s390x", "relates_to_product_reference": "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea" }, { "category": "default_component_of", "full_product_name": { "name": "rust-doc-0:1.58.1-1.module+el8.6.0+14021+586eff1a.x86_64 as a component of rust-toolset:rhel8:8060020220125235043:eab6f2ea as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rust-doc-0:1.58.1-1.module+el8.6.0+14021+586eff1a.x86_64" }, "product_reference": "rust-doc-0:1.58.1-1.module+el8.6.0+14021+586eff1a.x86_64", "relates_to_product_reference": "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea" }, { "category": "default_component_of", "full_product_name": { "name": "rust-gdb-0:1.58.1-1.module+el8.6.0+14021+586eff1a.noarch as a component of rust-toolset:rhel8:8060020220125235043:eab6f2ea as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rust-gdb-0:1.58.1-1.module+el8.6.0+14021+586eff1a.noarch" }, "product_reference": "rust-gdb-0:1.58.1-1.module+el8.6.0+14021+586eff1a.noarch", "relates_to_product_reference": "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea" }, { "category": "default_component_of", "full_product_name": { "name": "rust-lldb-0:1.58.1-1.module+el8.6.0+14021+586eff1a.noarch as a component of rust-toolset:rhel8:8060020220125235043:eab6f2ea as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rust-lldb-0:1.58.1-1.module+el8.6.0+14021+586eff1a.noarch" }, "product_reference": "rust-lldb-0:1.58.1-1.module+el8.6.0+14021+586eff1a.noarch", "relates_to_product_reference": "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea" }, { "category": "default_component_of", "full_product_name": { "name": "rust-src-0:1.58.1-1.module+el8.6.0+14021+586eff1a.noarch as a component of rust-toolset:rhel8:8060020220125235043:eab6f2ea as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rust-src-0:1.58.1-1.module+el8.6.0+14021+586eff1a.noarch" }, "product_reference": "rust-src-0:1.58.1-1.module+el8.6.0+14021+586eff1a.noarch", "relates_to_product_reference": "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea" }, { "category": "default_component_of", "full_product_name": { "name": "rust-std-static-0:1.58.1-1.module+el8.6.0+14021+586eff1a.aarch64 as a component of rust-toolset:rhel8:8060020220125235043:eab6f2ea as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rust-std-static-0:1.58.1-1.module+el8.6.0+14021+586eff1a.aarch64" }, "product_reference": "rust-std-static-0:1.58.1-1.module+el8.6.0+14021+586eff1a.aarch64", "relates_to_product_reference": "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea" }, { "category": "default_component_of", "full_product_name": { "name": "rust-std-static-0:1.58.1-1.module+el8.6.0+14021+586eff1a.ppc64le as a component of rust-toolset:rhel8:8060020220125235043:eab6f2ea as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rust-std-static-0:1.58.1-1.module+el8.6.0+14021+586eff1a.ppc64le" }, "product_reference": "rust-std-static-0:1.58.1-1.module+el8.6.0+14021+586eff1a.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea" }, { "category": "default_component_of", "full_product_name": { "name": "rust-std-static-0:1.58.1-1.module+el8.6.0+14021+586eff1a.s390x as a component of rust-toolset:rhel8:8060020220125235043:eab6f2ea as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rust-std-static-0:1.58.1-1.module+el8.6.0+14021+586eff1a.s390x" }, "product_reference": "rust-std-static-0:1.58.1-1.module+el8.6.0+14021+586eff1a.s390x", "relates_to_product_reference": "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea" }, { "category": "default_component_of", "full_product_name": { "name": "rust-std-static-0:1.58.1-1.module+el8.6.0+14021+586eff1a.x86_64 as a component of rust-toolset:rhel8:8060020220125235043:eab6f2ea as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rust-std-static-0:1.58.1-1.module+el8.6.0+14021+586eff1a.x86_64" }, "product_reference": "rust-std-static-0:1.58.1-1.module+el8.6.0+14021+586eff1a.x86_64", "relates_to_product_reference": "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea" }, { "category": "default_component_of", "full_product_name": { "name": "rust-std-static-wasm32-unknown-unknown-0:1.58.1-1.module+el8.6.0+14021+586eff1a.aarch64 as a component of rust-toolset:rhel8:8060020220125235043:eab6f2ea as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rust-std-static-wasm32-unknown-unknown-0:1.58.1-1.module+el8.6.0+14021+586eff1a.aarch64" }, "product_reference": "rust-std-static-wasm32-unknown-unknown-0:1.58.1-1.module+el8.6.0+14021+586eff1a.aarch64", "relates_to_product_reference": "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea" }, { "category": "default_component_of", "full_product_name": { "name": "rust-std-static-wasm32-unknown-unknown-0:1.58.1-1.module+el8.6.0+14021+586eff1a.ppc64le as a component of rust-toolset:rhel8:8060020220125235043:eab6f2ea as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rust-std-static-wasm32-unknown-unknown-0:1.58.1-1.module+el8.6.0+14021+586eff1a.ppc64le" }, "product_reference": "rust-std-static-wasm32-unknown-unknown-0:1.58.1-1.module+el8.6.0+14021+586eff1a.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea" }, { "category": "default_component_of", "full_product_name": { "name": "rust-std-static-wasm32-unknown-unknown-0:1.58.1-1.module+el8.6.0+14021+586eff1a.x86_64 as a component of rust-toolset:rhel8:8060020220125235043:eab6f2ea as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rust-std-static-wasm32-unknown-unknown-0:1.58.1-1.module+el8.6.0+14021+586eff1a.x86_64" }, "product_reference": "rust-std-static-wasm32-unknown-unknown-0:1.58.1-1.module+el8.6.0+14021+586eff1a.x86_64", "relates_to_product_reference": "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea" }, { "category": "default_component_of", "full_product_name": { "name": "rust-std-static-wasm32-wasi-0:1.58.1-1.module+el8.6.0+14021+586eff1a.aarch64 as a component of rust-toolset:rhel8:8060020220125235043:eab6f2ea as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rust-std-static-wasm32-wasi-0:1.58.1-1.module+el8.6.0+14021+586eff1a.aarch64" }, "product_reference": "rust-std-static-wasm32-wasi-0:1.58.1-1.module+el8.6.0+14021+586eff1a.aarch64", "relates_to_product_reference": "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea" }, { "category": "default_component_of", "full_product_name": { "name": "rust-std-static-wasm32-wasi-0:1.58.1-1.module+el8.6.0+14021+586eff1a.ppc64le as a component of rust-toolset:rhel8:8060020220125235043:eab6f2ea as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rust-std-static-wasm32-wasi-0:1.58.1-1.module+el8.6.0+14021+586eff1a.ppc64le" }, "product_reference": "rust-std-static-wasm32-wasi-0:1.58.1-1.module+el8.6.0+14021+586eff1a.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea" }, { "category": "default_component_of", "full_product_name": { "name": "rust-std-static-wasm32-wasi-0:1.58.1-1.module+el8.6.0+14021+586eff1a.x86_64 as a component of rust-toolset:rhel8:8060020220125235043:eab6f2ea as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rust-std-static-wasm32-wasi-0:1.58.1-1.module+el8.6.0+14021+586eff1a.x86_64" }, "product_reference": "rust-std-static-wasm32-wasi-0:1.58.1-1.module+el8.6.0+14021+586eff1a.x86_64", "relates_to_product_reference": "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea" }, { "category": "default_component_of", "full_product_name": { "name": "rust-toolset-0:1.58.1-1.module+el8.6.0+14021+586eff1a.aarch64 as a component of rust-toolset:rhel8:8060020220125235043:eab6f2ea as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rust-toolset-0:1.58.1-1.module+el8.6.0+14021+586eff1a.aarch64" }, "product_reference": "rust-toolset-0:1.58.1-1.module+el8.6.0+14021+586eff1a.aarch64", "relates_to_product_reference": "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea" }, { "category": "default_component_of", "full_product_name": { "name": "rust-toolset-0:1.58.1-1.module+el8.6.0+14021+586eff1a.ppc64le as a component of rust-toolset:rhel8:8060020220125235043:eab6f2ea as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rust-toolset-0:1.58.1-1.module+el8.6.0+14021+586eff1a.ppc64le" }, "product_reference": "rust-toolset-0:1.58.1-1.module+el8.6.0+14021+586eff1a.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea" }, { "category": "default_component_of", "full_product_name": { "name": "rust-toolset-0:1.58.1-1.module+el8.6.0+14021+586eff1a.s390x as a component of rust-toolset:rhel8:8060020220125235043:eab6f2ea as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rust-toolset-0:1.58.1-1.module+el8.6.0+14021+586eff1a.s390x" }, "product_reference": "rust-toolset-0:1.58.1-1.module+el8.6.0+14021+586eff1a.s390x", "relates_to_product_reference": "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea" }, { "category": "default_component_of", "full_product_name": { "name": "rust-toolset-0:1.58.1-1.module+el8.6.0+14021+586eff1a.src as a component of rust-toolset:rhel8:8060020220125235043:eab6f2ea as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rust-toolset-0:1.58.1-1.module+el8.6.0+14021+586eff1a.src" }, "product_reference": "rust-toolset-0:1.58.1-1.module+el8.6.0+14021+586eff1a.src", "relates_to_product_reference": "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea" }, { "category": "default_component_of", "full_product_name": { "name": "rust-toolset-0:1.58.1-1.module+el8.6.0+14021+586eff1a.x86_64 as a component of rust-toolset:rhel8:8060020220125235043:eab6f2ea as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rust-toolset-0:1.58.1-1.module+el8.6.0+14021+586eff1a.x86_64" }, "product_reference": "rust-toolset-0:1.58.1-1.module+el8.6.0+14021+586eff1a.x86_64", "relates_to_product_reference": "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea" }, { "category": "default_component_of", "full_product_name": { "name": "rustfmt-0:1.58.1-1.module+el8.6.0+14021+586eff1a.aarch64 as a component of rust-toolset:rhel8:8060020220125235043:eab6f2ea as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rustfmt-0:1.58.1-1.module+el8.6.0+14021+586eff1a.aarch64" }, "product_reference": "rustfmt-0:1.58.1-1.module+el8.6.0+14021+586eff1a.aarch64", "relates_to_product_reference": "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea" }, { "category": "default_component_of", "full_product_name": { "name": "rustfmt-0:1.58.1-1.module+el8.6.0+14021+586eff1a.ppc64le as a component of rust-toolset:rhel8:8060020220125235043:eab6f2ea as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rustfmt-0:1.58.1-1.module+el8.6.0+14021+586eff1a.ppc64le" }, "product_reference": "rustfmt-0:1.58.1-1.module+el8.6.0+14021+586eff1a.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea" }, { "category": "default_component_of", "full_product_name": { "name": "rustfmt-0:1.58.1-1.module+el8.6.0+14021+586eff1a.s390x as a component of rust-toolset:rhel8:8060020220125235043:eab6f2ea as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rustfmt-0:1.58.1-1.module+el8.6.0+14021+586eff1a.s390x" }, "product_reference": "rustfmt-0:1.58.1-1.module+el8.6.0+14021+586eff1a.s390x", "relates_to_product_reference": "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea" }, { "category": "default_component_of", "full_product_name": { "name": "rustfmt-0:1.58.1-1.module+el8.6.0+14021+586eff1a.x86_64 as a component of rust-toolset:rhel8:8060020220125235043:eab6f2ea as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rustfmt-0:1.58.1-1.module+el8.6.0+14021+586eff1a.x86_64" }, "product_reference": "rustfmt-0:1.58.1-1.module+el8.6.0+14021+586eff1a.x86_64", "relates_to_product_reference": "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea" }, { "category": "default_component_of", "full_product_name": { "name": "rustfmt-debuginfo-0:1.58.1-1.module+el8.6.0+14021+586eff1a.aarch64 as a component of rust-toolset:rhel8:8060020220125235043:eab6f2ea as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rustfmt-debuginfo-0:1.58.1-1.module+el8.6.0+14021+586eff1a.aarch64" }, "product_reference": "rustfmt-debuginfo-0:1.58.1-1.module+el8.6.0+14021+586eff1a.aarch64", "relates_to_product_reference": "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea" }, { "category": "default_component_of", "full_product_name": { "name": "rustfmt-debuginfo-0:1.58.1-1.module+el8.6.0+14021+586eff1a.ppc64le as a component of rust-toolset:rhel8:8060020220125235043:eab6f2ea as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rustfmt-debuginfo-0:1.58.1-1.module+el8.6.0+14021+586eff1a.ppc64le" }, "product_reference": "rustfmt-debuginfo-0:1.58.1-1.module+el8.6.0+14021+586eff1a.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea" }, { "category": "default_component_of", "full_product_name": { "name": "rustfmt-debuginfo-0:1.58.1-1.module+el8.6.0+14021+586eff1a.s390x as a component of rust-toolset:rhel8:8060020220125235043:eab6f2ea as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rustfmt-debuginfo-0:1.58.1-1.module+el8.6.0+14021+586eff1a.s390x" }, "product_reference": "rustfmt-debuginfo-0:1.58.1-1.module+el8.6.0+14021+586eff1a.s390x", "relates_to_product_reference": "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea" }, { "category": "default_component_of", "full_product_name": { "name": "rustfmt-debuginfo-0:1.58.1-1.module+el8.6.0+14021+586eff1a.x86_64 as a component of rust-toolset:rhel8:8060020220125235043:eab6f2ea as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rustfmt-debuginfo-0:1.58.1-1.module+el8.6.0+14021+586eff1a.x86_64" }, "product_reference": "rustfmt-debuginfo-0:1.58.1-1.module+el8.6.0+14021+586eff1a.x86_64", "relates_to_product_reference": "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-21658", "cwe": { "id": "CWE-367", "name": "Time-of-check Time-of-use (TOCTOU) Race Condition" }, "discovery_date": "2022-01-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2041504" } ], "notes": [ { "category": "description", "text": "A race condition flaw was found in Rust\u0027s std::fs::remove_dir_all function. Rust applications that use this function may be vulnerable to a race condition where an unprivileged attacker can trick the application into deleting files and directories, causing an impact on system data integrity. If the application is privileged, an attacker can possibly delete files they would not usually have access to.", "title": "Vulnerability description" }, { "category": "summary", "text": "rust: Race condition in remove_dir_all leading to removal of files outside of the directory being removed", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw has been given a Severity of Moderate because it is not exploitable at will on every Rust program as it requires a specific scenario where a privileged program uses a specific Rust stdlib function, the attacker has some knowledge of the program\u0027s file operations, and has the normal limitations and challenges of a \nTime-of-check to time-of-use (TOCTOU). It must also be carried out by an unprivileged attacker.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:cargo-0:1.58.1-1.module+el8.6.0+14021+586eff1a.aarch64", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:cargo-0:1.58.1-1.module+el8.6.0+14021+586eff1a.ppc64le", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:cargo-0:1.58.1-1.module+el8.6.0+14021+586eff1a.s390x", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:cargo-0:1.58.1-1.module+el8.6.0+14021+586eff1a.x86_64", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:cargo-debuginfo-0:1.58.1-1.module+el8.6.0+14021+586eff1a.aarch64", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:cargo-debuginfo-0:1.58.1-1.module+el8.6.0+14021+586eff1a.ppc64le", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:cargo-debuginfo-0:1.58.1-1.module+el8.6.0+14021+586eff1a.s390x", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:cargo-debuginfo-0:1.58.1-1.module+el8.6.0+14021+586eff1a.x86_64", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:cargo-doc-0:1.58.1-1.module+el8.6.0+14021+586eff1a.noarch", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:clippy-0:1.58.1-1.module+el8.6.0+14021+586eff1a.aarch64", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:clippy-0:1.58.1-1.module+el8.6.0+14021+586eff1a.ppc64le", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:clippy-0:1.58.1-1.module+el8.6.0+14021+586eff1a.s390x", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:clippy-0:1.58.1-1.module+el8.6.0+14021+586eff1a.x86_64", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:clippy-debuginfo-0:1.58.1-1.module+el8.6.0+14021+586eff1a.aarch64", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:clippy-debuginfo-0:1.58.1-1.module+el8.6.0+14021+586eff1a.ppc64le", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:clippy-debuginfo-0:1.58.1-1.module+el8.6.0+14021+586eff1a.s390x", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:clippy-debuginfo-0:1.58.1-1.module+el8.6.0+14021+586eff1a.x86_64", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rls-0:1.58.1-1.module+el8.6.0+14021+586eff1a.aarch64", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rls-0:1.58.1-1.module+el8.6.0+14021+586eff1a.ppc64le", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rls-0:1.58.1-1.module+el8.6.0+14021+586eff1a.s390x", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rls-0:1.58.1-1.module+el8.6.0+14021+586eff1a.x86_64", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rls-debuginfo-0:1.58.1-1.module+el8.6.0+14021+586eff1a.aarch64", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rls-debuginfo-0:1.58.1-1.module+el8.6.0+14021+586eff1a.ppc64le", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rls-debuginfo-0:1.58.1-1.module+el8.6.0+14021+586eff1a.s390x", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rls-debuginfo-0:1.58.1-1.module+el8.6.0+14021+586eff1a.x86_64", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rust-0:1.58.1-1.module+el8.6.0+14021+586eff1a.aarch64", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rust-0:1.58.1-1.module+el8.6.0+14021+586eff1a.ppc64le", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rust-0:1.58.1-1.module+el8.6.0+14021+586eff1a.s390x", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rust-0:1.58.1-1.module+el8.6.0+14021+586eff1a.src", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rust-0:1.58.1-1.module+el8.6.0+14021+586eff1a.x86_64", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rust-analysis-0:1.58.1-1.module+el8.6.0+14021+586eff1a.aarch64", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rust-analysis-0:1.58.1-1.module+el8.6.0+14021+586eff1a.ppc64le", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rust-analysis-0:1.58.1-1.module+el8.6.0+14021+586eff1a.s390x", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rust-analysis-0:1.58.1-1.module+el8.6.0+14021+586eff1a.x86_64", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rust-debugger-common-0:1.58.1-1.module+el8.6.0+14021+586eff1a.noarch", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rust-debuginfo-0:1.58.1-1.module+el8.6.0+14021+586eff1a.aarch64", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rust-debuginfo-0:1.58.1-1.module+el8.6.0+14021+586eff1a.ppc64le", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rust-debuginfo-0:1.58.1-1.module+el8.6.0+14021+586eff1a.s390x", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rust-debuginfo-0:1.58.1-1.module+el8.6.0+14021+586eff1a.x86_64", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rust-debugsource-0:1.58.1-1.module+el8.6.0+14021+586eff1a.aarch64", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rust-debugsource-0:1.58.1-1.module+el8.6.0+14021+586eff1a.ppc64le", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rust-debugsource-0:1.58.1-1.module+el8.6.0+14021+586eff1a.s390x", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rust-debugsource-0:1.58.1-1.module+el8.6.0+14021+586eff1a.x86_64", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rust-doc-0:1.58.1-1.module+el8.6.0+14021+586eff1a.aarch64", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rust-doc-0:1.58.1-1.module+el8.6.0+14021+586eff1a.ppc64le", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rust-doc-0:1.58.1-1.module+el8.6.0+14021+586eff1a.s390x", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rust-doc-0:1.58.1-1.module+el8.6.0+14021+586eff1a.x86_64", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rust-gdb-0:1.58.1-1.module+el8.6.0+14021+586eff1a.noarch", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rust-lldb-0:1.58.1-1.module+el8.6.0+14021+586eff1a.noarch", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rust-src-0:1.58.1-1.module+el8.6.0+14021+586eff1a.noarch", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rust-std-static-0:1.58.1-1.module+el8.6.0+14021+586eff1a.aarch64", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rust-std-static-0:1.58.1-1.module+el8.6.0+14021+586eff1a.ppc64le", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rust-std-static-0:1.58.1-1.module+el8.6.0+14021+586eff1a.s390x", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rust-std-static-0:1.58.1-1.module+el8.6.0+14021+586eff1a.x86_64", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rust-std-static-wasm32-unknown-unknown-0:1.58.1-1.module+el8.6.0+14021+586eff1a.aarch64", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rust-std-static-wasm32-unknown-unknown-0:1.58.1-1.module+el8.6.0+14021+586eff1a.ppc64le", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rust-std-static-wasm32-unknown-unknown-0:1.58.1-1.module+el8.6.0+14021+586eff1a.x86_64", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rust-std-static-wasm32-wasi-0:1.58.1-1.module+el8.6.0+14021+586eff1a.aarch64", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rust-std-static-wasm32-wasi-0:1.58.1-1.module+el8.6.0+14021+586eff1a.ppc64le", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rust-std-static-wasm32-wasi-0:1.58.1-1.module+el8.6.0+14021+586eff1a.x86_64", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rust-toolset-0:1.58.1-1.module+el8.6.0+14021+586eff1a.aarch64", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rust-toolset-0:1.58.1-1.module+el8.6.0+14021+586eff1a.ppc64le", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rust-toolset-0:1.58.1-1.module+el8.6.0+14021+586eff1a.s390x", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rust-toolset-0:1.58.1-1.module+el8.6.0+14021+586eff1a.src", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rust-toolset-0:1.58.1-1.module+el8.6.0+14021+586eff1a.x86_64", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rustfmt-0:1.58.1-1.module+el8.6.0+14021+586eff1a.aarch64", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rustfmt-0:1.58.1-1.module+el8.6.0+14021+586eff1a.ppc64le", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rustfmt-0:1.58.1-1.module+el8.6.0+14021+586eff1a.s390x", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rustfmt-0:1.58.1-1.module+el8.6.0+14021+586eff1a.x86_64", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rustfmt-debuginfo-0:1.58.1-1.module+el8.6.0+14021+586eff1a.aarch64", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rustfmt-debuginfo-0:1.58.1-1.module+el8.6.0+14021+586eff1a.ppc64le", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rustfmt-debuginfo-0:1.58.1-1.module+el8.6.0+14021+586eff1a.s390x", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rustfmt-debuginfo-0:1.58.1-1.module+el8.6.0+14021+586eff1a.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-21658" }, { "category": "external", "summary": "RHBZ#2041504", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2041504" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-21658", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21658" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-21658", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-21658" }, { "category": "external", "summary": "https://github.com/rust-lang/rust/security/advisories/GHSA-r9cc-f5pr-p3j2", "url": "https://github.com/rust-lang/rust/security/advisories/GHSA-r9cc-f5pr-p3j2" } ], "release_date": "2022-01-20T11:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-05-10T13:35:59+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:cargo-0:1.58.1-1.module+el8.6.0+14021+586eff1a.aarch64", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:cargo-0:1.58.1-1.module+el8.6.0+14021+586eff1a.ppc64le", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:cargo-0:1.58.1-1.module+el8.6.0+14021+586eff1a.s390x", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:cargo-0:1.58.1-1.module+el8.6.0+14021+586eff1a.x86_64", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:cargo-debuginfo-0:1.58.1-1.module+el8.6.0+14021+586eff1a.aarch64", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:cargo-debuginfo-0:1.58.1-1.module+el8.6.0+14021+586eff1a.ppc64le", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:cargo-debuginfo-0:1.58.1-1.module+el8.6.0+14021+586eff1a.s390x", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:cargo-debuginfo-0:1.58.1-1.module+el8.6.0+14021+586eff1a.x86_64", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:cargo-doc-0:1.58.1-1.module+el8.6.0+14021+586eff1a.noarch", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:clippy-0:1.58.1-1.module+el8.6.0+14021+586eff1a.aarch64", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:clippy-0:1.58.1-1.module+el8.6.0+14021+586eff1a.ppc64le", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:clippy-0:1.58.1-1.module+el8.6.0+14021+586eff1a.s390x", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:clippy-0:1.58.1-1.module+el8.6.0+14021+586eff1a.x86_64", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:clippy-debuginfo-0:1.58.1-1.module+el8.6.0+14021+586eff1a.aarch64", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:clippy-debuginfo-0:1.58.1-1.module+el8.6.0+14021+586eff1a.ppc64le", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:clippy-debuginfo-0:1.58.1-1.module+el8.6.0+14021+586eff1a.s390x", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:clippy-debuginfo-0:1.58.1-1.module+el8.6.0+14021+586eff1a.x86_64", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rls-0:1.58.1-1.module+el8.6.0+14021+586eff1a.aarch64", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rls-0:1.58.1-1.module+el8.6.0+14021+586eff1a.ppc64le", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rls-0:1.58.1-1.module+el8.6.0+14021+586eff1a.s390x", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rls-0:1.58.1-1.module+el8.6.0+14021+586eff1a.x86_64", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rls-debuginfo-0:1.58.1-1.module+el8.6.0+14021+586eff1a.aarch64", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rls-debuginfo-0:1.58.1-1.module+el8.6.0+14021+586eff1a.ppc64le", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rls-debuginfo-0:1.58.1-1.module+el8.6.0+14021+586eff1a.s390x", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rls-debuginfo-0:1.58.1-1.module+el8.6.0+14021+586eff1a.x86_64", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rust-0:1.58.1-1.module+el8.6.0+14021+586eff1a.aarch64", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rust-0:1.58.1-1.module+el8.6.0+14021+586eff1a.ppc64le", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rust-0:1.58.1-1.module+el8.6.0+14021+586eff1a.s390x", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rust-0:1.58.1-1.module+el8.6.0+14021+586eff1a.src", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rust-0:1.58.1-1.module+el8.6.0+14021+586eff1a.x86_64", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rust-analysis-0:1.58.1-1.module+el8.6.0+14021+586eff1a.aarch64", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rust-analysis-0:1.58.1-1.module+el8.6.0+14021+586eff1a.ppc64le", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rust-analysis-0:1.58.1-1.module+el8.6.0+14021+586eff1a.s390x", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rust-analysis-0:1.58.1-1.module+el8.6.0+14021+586eff1a.x86_64", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rust-debugger-common-0:1.58.1-1.module+el8.6.0+14021+586eff1a.noarch", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rust-debuginfo-0:1.58.1-1.module+el8.6.0+14021+586eff1a.aarch64", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rust-debuginfo-0:1.58.1-1.module+el8.6.0+14021+586eff1a.ppc64le", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rust-debuginfo-0:1.58.1-1.module+el8.6.0+14021+586eff1a.s390x", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rust-debuginfo-0:1.58.1-1.module+el8.6.0+14021+586eff1a.x86_64", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rust-debugsource-0:1.58.1-1.module+el8.6.0+14021+586eff1a.aarch64", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rust-debugsource-0:1.58.1-1.module+el8.6.0+14021+586eff1a.ppc64le", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rust-debugsource-0:1.58.1-1.module+el8.6.0+14021+586eff1a.s390x", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rust-debugsource-0:1.58.1-1.module+el8.6.0+14021+586eff1a.x86_64", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rust-doc-0:1.58.1-1.module+el8.6.0+14021+586eff1a.aarch64", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rust-doc-0:1.58.1-1.module+el8.6.0+14021+586eff1a.ppc64le", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rust-doc-0:1.58.1-1.module+el8.6.0+14021+586eff1a.s390x", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rust-doc-0:1.58.1-1.module+el8.6.0+14021+586eff1a.x86_64", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rust-gdb-0:1.58.1-1.module+el8.6.0+14021+586eff1a.noarch", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rust-lldb-0:1.58.1-1.module+el8.6.0+14021+586eff1a.noarch", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rust-src-0:1.58.1-1.module+el8.6.0+14021+586eff1a.noarch", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rust-std-static-0:1.58.1-1.module+el8.6.0+14021+586eff1a.aarch64", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rust-std-static-0:1.58.1-1.module+el8.6.0+14021+586eff1a.ppc64le", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rust-std-static-0:1.58.1-1.module+el8.6.0+14021+586eff1a.s390x", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rust-std-static-0:1.58.1-1.module+el8.6.0+14021+586eff1a.x86_64", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rust-std-static-wasm32-unknown-unknown-0:1.58.1-1.module+el8.6.0+14021+586eff1a.aarch64", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rust-std-static-wasm32-unknown-unknown-0:1.58.1-1.module+el8.6.0+14021+586eff1a.ppc64le", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rust-std-static-wasm32-unknown-unknown-0:1.58.1-1.module+el8.6.0+14021+586eff1a.x86_64", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rust-std-static-wasm32-wasi-0:1.58.1-1.module+el8.6.0+14021+586eff1a.aarch64", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rust-std-static-wasm32-wasi-0:1.58.1-1.module+el8.6.0+14021+586eff1a.ppc64le", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rust-std-static-wasm32-wasi-0:1.58.1-1.module+el8.6.0+14021+586eff1a.x86_64", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rust-toolset-0:1.58.1-1.module+el8.6.0+14021+586eff1a.aarch64", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rust-toolset-0:1.58.1-1.module+el8.6.0+14021+586eff1a.ppc64le", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rust-toolset-0:1.58.1-1.module+el8.6.0+14021+586eff1a.s390x", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rust-toolset-0:1.58.1-1.module+el8.6.0+14021+586eff1a.src", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rust-toolset-0:1.58.1-1.module+el8.6.0+14021+586eff1a.x86_64", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rustfmt-0:1.58.1-1.module+el8.6.0+14021+586eff1a.aarch64", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rustfmt-0:1.58.1-1.module+el8.6.0+14021+586eff1a.ppc64le", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rustfmt-0:1.58.1-1.module+el8.6.0+14021+586eff1a.s390x", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rustfmt-0:1.58.1-1.module+el8.6.0+14021+586eff1a.x86_64", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rustfmt-debuginfo-0:1.58.1-1.module+el8.6.0+14021+586eff1a.aarch64", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rustfmt-debuginfo-0:1.58.1-1.module+el8.6.0+14021+586eff1a.ppc64le", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rustfmt-debuginfo-0:1.58.1-1.module+el8.6.0+14021+586eff1a.s390x", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rustfmt-debuginfo-0:1.58.1-1.module+el8.6.0+14021+586eff1a.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1894" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:cargo-0:1.58.1-1.module+el8.6.0+14021+586eff1a.aarch64", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:cargo-0:1.58.1-1.module+el8.6.0+14021+586eff1a.ppc64le", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:cargo-0:1.58.1-1.module+el8.6.0+14021+586eff1a.s390x", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:cargo-0:1.58.1-1.module+el8.6.0+14021+586eff1a.x86_64", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:cargo-debuginfo-0:1.58.1-1.module+el8.6.0+14021+586eff1a.aarch64", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:cargo-debuginfo-0:1.58.1-1.module+el8.6.0+14021+586eff1a.ppc64le", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:cargo-debuginfo-0:1.58.1-1.module+el8.6.0+14021+586eff1a.s390x", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:cargo-debuginfo-0:1.58.1-1.module+el8.6.0+14021+586eff1a.x86_64", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:cargo-doc-0:1.58.1-1.module+el8.6.0+14021+586eff1a.noarch", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:clippy-0:1.58.1-1.module+el8.6.0+14021+586eff1a.aarch64", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:clippy-0:1.58.1-1.module+el8.6.0+14021+586eff1a.ppc64le", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:clippy-0:1.58.1-1.module+el8.6.0+14021+586eff1a.s390x", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:clippy-0:1.58.1-1.module+el8.6.0+14021+586eff1a.x86_64", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:clippy-debuginfo-0:1.58.1-1.module+el8.6.0+14021+586eff1a.aarch64", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:clippy-debuginfo-0:1.58.1-1.module+el8.6.0+14021+586eff1a.ppc64le", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:clippy-debuginfo-0:1.58.1-1.module+el8.6.0+14021+586eff1a.s390x", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:clippy-debuginfo-0:1.58.1-1.module+el8.6.0+14021+586eff1a.x86_64", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rls-0:1.58.1-1.module+el8.6.0+14021+586eff1a.aarch64", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rls-0:1.58.1-1.module+el8.6.0+14021+586eff1a.ppc64le", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rls-0:1.58.1-1.module+el8.6.0+14021+586eff1a.s390x", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rls-0:1.58.1-1.module+el8.6.0+14021+586eff1a.x86_64", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rls-debuginfo-0:1.58.1-1.module+el8.6.0+14021+586eff1a.aarch64", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rls-debuginfo-0:1.58.1-1.module+el8.6.0+14021+586eff1a.ppc64le", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rls-debuginfo-0:1.58.1-1.module+el8.6.0+14021+586eff1a.s390x", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rls-debuginfo-0:1.58.1-1.module+el8.6.0+14021+586eff1a.x86_64", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rust-0:1.58.1-1.module+el8.6.0+14021+586eff1a.aarch64", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rust-0:1.58.1-1.module+el8.6.0+14021+586eff1a.ppc64le", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rust-0:1.58.1-1.module+el8.6.0+14021+586eff1a.s390x", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rust-0:1.58.1-1.module+el8.6.0+14021+586eff1a.src", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rust-0:1.58.1-1.module+el8.6.0+14021+586eff1a.x86_64", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rust-analysis-0:1.58.1-1.module+el8.6.0+14021+586eff1a.aarch64", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rust-analysis-0:1.58.1-1.module+el8.6.0+14021+586eff1a.ppc64le", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rust-analysis-0:1.58.1-1.module+el8.6.0+14021+586eff1a.s390x", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rust-analysis-0:1.58.1-1.module+el8.6.0+14021+586eff1a.x86_64", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rust-debugger-common-0:1.58.1-1.module+el8.6.0+14021+586eff1a.noarch", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rust-debuginfo-0:1.58.1-1.module+el8.6.0+14021+586eff1a.aarch64", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rust-debuginfo-0:1.58.1-1.module+el8.6.0+14021+586eff1a.ppc64le", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rust-debuginfo-0:1.58.1-1.module+el8.6.0+14021+586eff1a.s390x", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rust-debuginfo-0:1.58.1-1.module+el8.6.0+14021+586eff1a.x86_64", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rust-debugsource-0:1.58.1-1.module+el8.6.0+14021+586eff1a.aarch64", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rust-debugsource-0:1.58.1-1.module+el8.6.0+14021+586eff1a.ppc64le", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rust-debugsource-0:1.58.1-1.module+el8.6.0+14021+586eff1a.s390x", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rust-debugsource-0:1.58.1-1.module+el8.6.0+14021+586eff1a.x86_64", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rust-doc-0:1.58.1-1.module+el8.6.0+14021+586eff1a.aarch64", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rust-doc-0:1.58.1-1.module+el8.6.0+14021+586eff1a.ppc64le", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rust-doc-0:1.58.1-1.module+el8.6.0+14021+586eff1a.s390x", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rust-doc-0:1.58.1-1.module+el8.6.0+14021+586eff1a.x86_64", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rust-gdb-0:1.58.1-1.module+el8.6.0+14021+586eff1a.noarch", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rust-lldb-0:1.58.1-1.module+el8.6.0+14021+586eff1a.noarch", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rust-src-0:1.58.1-1.module+el8.6.0+14021+586eff1a.noarch", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rust-std-static-0:1.58.1-1.module+el8.6.0+14021+586eff1a.aarch64", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rust-std-static-0:1.58.1-1.module+el8.6.0+14021+586eff1a.ppc64le", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rust-std-static-0:1.58.1-1.module+el8.6.0+14021+586eff1a.s390x", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rust-std-static-0:1.58.1-1.module+el8.6.0+14021+586eff1a.x86_64", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rust-std-static-wasm32-unknown-unknown-0:1.58.1-1.module+el8.6.0+14021+586eff1a.aarch64", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rust-std-static-wasm32-unknown-unknown-0:1.58.1-1.module+el8.6.0+14021+586eff1a.ppc64le", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rust-std-static-wasm32-unknown-unknown-0:1.58.1-1.module+el8.6.0+14021+586eff1a.x86_64", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rust-std-static-wasm32-wasi-0:1.58.1-1.module+el8.6.0+14021+586eff1a.aarch64", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rust-std-static-wasm32-wasi-0:1.58.1-1.module+el8.6.0+14021+586eff1a.ppc64le", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rust-std-static-wasm32-wasi-0:1.58.1-1.module+el8.6.0+14021+586eff1a.x86_64", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rust-toolset-0:1.58.1-1.module+el8.6.0+14021+586eff1a.aarch64", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rust-toolset-0:1.58.1-1.module+el8.6.0+14021+586eff1a.ppc64le", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rust-toolset-0:1.58.1-1.module+el8.6.0+14021+586eff1a.s390x", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rust-toolset-0:1.58.1-1.module+el8.6.0+14021+586eff1a.src", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rust-toolset-0:1.58.1-1.module+el8.6.0+14021+586eff1a.x86_64", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rustfmt-0:1.58.1-1.module+el8.6.0+14021+586eff1a.aarch64", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rustfmt-0:1.58.1-1.module+el8.6.0+14021+586eff1a.ppc64le", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rustfmt-0:1.58.1-1.module+el8.6.0+14021+586eff1a.s390x", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rustfmt-0:1.58.1-1.module+el8.6.0+14021+586eff1a.x86_64", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rustfmt-debuginfo-0:1.58.1-1.module+el8.6.0+14021+586eff1a.aarch64", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rustfmt-debuginfo-0:1.58.1-1.module+el8.6.0+14021+586eff1a.ppc64le", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rustfmt-debuginfo-0:1.58.1-1.module+el8.6.0+14021+586eff1a.s390x", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rustfmt-debuginfo-0:1.58.1-1.module+el8.6.0+14021+586eff1a.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:cargo-0:1.58.1-1.module+el8.6.0+14021+586eff1a.aarch64", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:cargo-0:1.58.1-1.module+el8.6.0+14021+586eff1a.ppc64le", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:cargo-0:1.58.1-1.module+el8.6.0+14021+586eff1a.s390x", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:cargo-0:1.58.1-1.module+el8.6.0+14021+586eff1a.x86_64", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:cargo-debuginfo-0:1.58.1-1.module+el8.6.0+14021+586eff1a.aarch64", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:cargo-debuginfo-0:1.58.1-1.module+el8.6.0+14021+586eff1a.ppc64le", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:cargo-debuginfo-0:1.58.1-1.module+el8.6.0+14021+586eff1a.s390x", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:cargo-debuginfo-0:1.58.1-1.module+el8.6.0+14021+586eff1a.x86_64", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:cargo-doc-0:1.58.1-1.module+el8.6.0+14021+586eff1a.noarch", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:clippy-0:1.58.1-1.module+el8.6.0+14021+586eff1a.aarch64", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:clippy-0:1.58.1-1.module+el8.6.0+14021+586eff1a.ppc64le", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:clippy-0:1.58.1-1.module+el8.6.0+14021+586eff1a.s390x", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:clippy-0:1.58.1-1.module+el8.6.0+14021+586eff1a.x86_64", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:clippy-debuginfo-0:1.58.1-1.module+el8.6.0+14021+586eff1a.aarch64", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:clippy-debuginfo-0:1.58.1-1.module+el8.6.0+14021+586eff1a.ppc64le", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:clippy-debuginfo-0:1.58.1-1.module+el8.6.0+14021+586eff1a.s390x", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:clippy-debuginfo-0:1.58.1-1.module+el8.6.0+14021+586eff1a.x86_64", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rls-0:1.58.1-1.module+el8.6.0+14021+586eff1a.aarch64", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rls-0:1.58.1-1.module+el8.6.0+14021+586eff1a.ppc64le", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rls-0:1.58.1-1.module+el8.6.0+14021+586eff1a.s390x", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rls-0:1.58.1-1.module+el8.6.0+14021+586eff1a.x86_64", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rls-debuginfo-0:1.58.1-1.module+el8.6.0+14021+586eff1a.aarch64", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rls-debuginfo-0:1.58.1-1.module+el8.6.0+14021+586eff1a.ppc64le", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rls-debuginfo-0:1.58.1-1.module+el8.6.0+14021+586eff1a.s390x", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rls-debuginfo-0:1.58.1-1.module+el8.6.0+14021+586eff1a.x86_64", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rust-0:1.58.1-1.module+el8.6.0+14021+586eff1a.aarch64", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rust-0:1.58.1-1.module+el8.6.0+14021+586eff1a.ppc64le", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rust-0:1.58.1-1.module+el8.6.0+14021+586eff1a.s390x", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rust-0:1.58.1-1.module+el8.6.0+14021+586eff1a.src", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rust-0:1.58.1-1.module+el8.6.0+14021+586eff1a.x86_64", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rust-analysis-0:1.58.1-1.module+el8.6.0+14021+586eff1a.aarch64", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rust-analysis-0:1.58.1-1.module+el8.6.0+14021+586eff1a.ppc64le", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rust-analysis-0:1.58.1-1.module+el8.6.0+14021+586eff1a.s390x", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rust-analysis-0:1.58.1-1.module+el8.6.0+14021+586eff1a.x86_64", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rust-debugger-common-0:1.58.1-1.module+el8.6.0+14021+586eff1a.noarch", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rust-debuginfo-0:1.58.1-1.module+el8.6.0+14021+586eff1a.aarch64", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rust-debuginfo-0:1.58.1-1.module+el8.6.0+14021+586eff1a.ppc64le", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rust-debuginfo-0:1.58.1-1.module+el8.6.0+14021+586eff1a.s390x", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rust-debuginfo-0:1.58.1-1.module+el8.6.0+14021+586eff1a.x86_64", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rust-debugsource-0:1.58.1-1.module+el8.6.0+14021+586eff1a.aarch64", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rust-debugsource-0:1.58.1-1.module+el8.6.0+14021+586eff1a.ppc64le", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rust-debugsource-0:1.58.1-1.module+el8.6.0+14021+586eff1a.s390x", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rust-debugsource-0:1.58.1-1.module+el8.6.0+14021+586eff1a.x86_64", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rust-doc-0:1.58.1-1.module+el8.6.0+14021+586eff1a.aarch64", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rust-doc-0:1.58.1-1.module+el8.6.0+14021+586eff1a.ppc64le", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rust-doc-0:1.58.1-1.module+el8.6.0+14021+586eff1a.s390x", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rust-doc-0:1.58.1-1.module+el8.6.0+14021+586eff1a.x86_64", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rust-gdb-0:1.58.1-1.module+el8.6.0+14021+586eff1a.noarch", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rust-lldb-0:1.58.1-1.module+el8.6.0+14021+586eff1a.noarch", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rust-src-0:1.58.1-1.module+el8.6.0+14021+586eff1a.noarch", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rust-std-static-0:1.58.1-1.module+el8.6.0+14021+586eff1a.aarch64", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rust-std-static-0:1.58.1-1.module+el8.6.0+14021+586eff1a.ppc64le", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rust-std-static-0:1.58.1-1.module+el8.6.0+14021+586eff1a.s390x", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rust-std-static-0:1.58.1-1.module+el8.6.0+14021+586eff1a.x86_64", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rust-std-static-wasm32-unknown-unknown-0:1.58.1-1.module+el8.6.0+14021+586eff1a.aarch64", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rust-std-static-wasm32-unknown-unknown-0:1.58.1-1.module+el8.6.0+14021+586eff1a.ppc64le", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rust-std-static-wasm32-unknown-unknown-0:1.58.1-1.module+el8.6.0+14021+586eff1a.x86_64", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rust-std-static-wasm32-wasi-0:1.58.1-1.module+el8.6.0+14021+586eff1a.aarch64", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rust-std-static-wasm32-wasi-0:1.58.1-1.module+el8.6.0+14021+586eff1a.ppc64le", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rust-std-static-wasm32-wasi-0:1.58.1-1.module+el8.6.0+14021+586eff1a.x86_64", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rust-toolset-0:1.58.1-1.module+el8.6.0+14021+586eff1a.aarch64", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rust-toolset-0:1.58.1-1.module+el8.6.0+14021+586eff1a.ppc64le", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rust-toolset-0:1.58.1-1.module+el8.6.0+14021+586eff1a.s390x", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rust-toolset-0:1.58.1-1.module+el8.6.0+14021+586eff1a.src", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rust-toolset-0:1.58.1-1.module+el8.6.0+14021+586eff1a.x86_64", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rustfmt-0:1.58.1-1.module+el8.6.0+14021+586eff1a.aarch64", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rustfmt-0:1.58.1-1.module+el8.6.0+14021+586eff1a.ppc64le", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rustfmt-0:1.58.1-1.module+el8.6.0+14021+586eff1a.s390x", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rustfmt-0:1.58.1-1.module+el8.6.0+14021+586eff1a.x86_64", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rustfmt-debuginfo-0:1.58.1-1.module+el8.6.0+14021+586eff1a.aarch64", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rustfmt-debuginfo-0:1.58.1-1.module+el8.6.0+14021+586eff1a.ppc64le", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rustfmt-debuginfo-0:1.58.1-1.module+el8.6.0+14021+586eff1a.s390x", "AppStream-8.6.0.GA:rust-toolset:rhel8:8060020220125235043:eab6f2ea:rustfmt-debuginfo-0:1.58.1-1.module+el8.6.0+14021+586eff1a.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "rust: Race condition in remove_dir_all leading to removal of files outside of the directory being removed" } ] }
gsd-2022-21658
Vulnerability from gsd
Modified
2023-12-13 01:19
Details
Rust is a multi-paradigm, general-purpose programming language designed for performance and safety, especially safe concurrency. The Rust Security Response WG was notified that the `std::fs::remove_dir_all` standard library function is vulnerable a race condition enabling symlink following (CWE-363). An attacker could use this security issue to trick a privileged program into deleting files and directories the attacker couldn't otherwise access or delete. Rust 1.0.0 through Rust 1.58.0 is affected by this vulnerability with 1.58.1 containing a patch. Note that the following build targets don't have usable APIs to properly mitigate the attack, and are thus still vulnerable even with a patched toolchain: macOS before version 10.10 (Yosemite) and REDOX. We recommend everyone to update to Rust 1.58.1 as soon as possible, especially people developing programs expected to run in privileged contexts (including system daemons and setuid binaries), as those have the highest risk of being affected by this. Note that adding checks in your codebase before calling remove_dir_all will not mitigate the vulnerability, as they would also be vulnerable to race conditions like remove_dir_all itself. The existing mitigation is working as intended outside of race conditions.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2022-21658", "description": "Rust is a multi-paradigm, general-purpose programming language designed for performance and safety, especially safe concurrency. The Rust Security Response WG was notified that the `std::fs::remove_dir_all` standard library function is vulnerable a race condition enabling symlink following (CWE-363). An attacker could use this security issue to trick a privileged program into deleting files and directories the attacker couldn\u0027t otherwise access or delete. Rust 1.0.0 through Rust 1.58.0 is affected by this vulnerability with 1.58.1 containing a patch. Note that the following build targets don\u0027t have usable APIs to properly mitigate the attack, and are thus still vulnerable even with a patched toolchain: macOS before version 10.10 (Yosemite) and REDOX. We recommend everyone to update to Rust 1.58.1 as soon as possible, especially people developing programs expected to run in privileged contexts (including system daemons and setuid binaries), as those have the highest risk of being affected by this. Note that adding checks in your codebase before calling remove_dir_all will not mitigate the vulnerability, as they would also be vulnerable to race conditions like remove_dir_all itself. The existing mitigation is working as intended outside of race conditions.", "id": "GSD-2022-21658", "references": [ "https://www.suse.com/security/cve/CVE-2022-21658.html", "https://advisories.mageia.org/CVE-2022-21658.html", "https://linux.oracle.com/cve/CVE-2022-21658.html", "https://access.redhat.com/errata/RHSA-2022:1894" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2022-21658" ], "details": "Rust is a multi-paradigm, general-purpose programming language designed for performance and safety, especially safe concurrency. The Rust Security Response WG was notified that the `std::fs::remove_dir_all` standard library function is vulnerable a race condition enabling symlink following (CWE-363). An attacker could use this security issue to trick a privileged program into deleting files and directories the attacker couldn\u0027t otherwise access or delete. Rust 1.0.0 through Rust 1.58.0 is affected by this vulnerability with 1.58.1 containing a patch. Note that the following build targets don\u0027t have usable APIs to properly mitigate the attack, and are thus still vulnerable even with a patched toolchain: macOS before version 10.10 (Yosemite) and REDOX. We recommend everyone to update to Rust 1.58.1 as soon as possible, especially people developing programs expected to run in privileged contexts (including system daemons and setuid binaries), as those have the highest risk of being affected by this. Note that adding checks in your codebase before calling remove_dir_all will not mitigate the vulnerability, as they would also be vulnerable to race conditions like remove_dir_all itself. The existing mitigation is working as intended outside of race conditions.", "id": "GSD-2022-21658", "modified": "2023-12-13T01:19:14.127854Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2022-21658", "STATE": "PUBLIC", "TITLE": "Race condition in std::fs::remove_dir_all in rustlang" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "rust", "version": { "version_data": [ { "version_value": "\u003c 1.58.1" } ] } } ] }, "vendor_name": "rust-lang" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Rust is a multi-paradigm, general-purpose programming language designed for performance and safety, especially safe concurrency. The Rust Security Response WG was notified that the `std::fs::remove_dir_all` standard library function is vulnerable a race condition enabling symlink following (CWE-363). An attacker could use this security issue to trick a privileged program into deleting files and directories the attacker couldn\u0027t otherwise access or delete. Rust 1.0.0 through Rust 1.58.0 is affected by this vulnerability with 1.58.1 containing a patch. Note that the following build targets don\u0027t have usable APIs to properly mitigate the attack, and are thus still vulnerable even with a patched toolchain: macOS before version 10.10 (Yosemite) and REDOX. We recommend everyone to update to Rust 1.58.1 as soon as possible, especially people developing programs expected to run in privileged contexts (including system daemons and setuid binaries), as those have the highest risk of being affected by this. Note that adding checks in your codebase before calling remove_dir_all will not mitigate the vulnerability, as they would also be vulnerable to race conditions like remove_dir_all itself. The existing mitigation is working as intended outside of race conditions." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-363: Race Condition Enabling Link Following" } ] }, { "description": [ { "lang": "eng", "value": "CWE-367: Time-of-check Time-of-use (TOCTOU) Race Condition" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/rust-lang/rust/security/advisories/GHSA-r9cc-f5pr-p3j2", "refsource": "CONFIRM", "url": "https://github.com/rust-lang/rust/security/advisories/GHSA-r9cc-f5pr-p3j2" }, { "name": "https://github.com/rust-lang/rust/pull/93110", "refsource": "MISC", "url": "https://github.com/rust-lang/rust/pull/93110" }, { "name": "https://github.com/rust-lang/rust/pull/93110/commits/32ed6e599bb4722efefd78bbc9cd7ec4613cb946", "refsource": "MISC", "url": "https://github.com/rust-lang/rust/pull/93110/commits/32ed6e599bb4722efefd78bbc9cd7ec4613cb946" }, { "name": "https://github.com/rust-lang/rust/pull/93110/commits/406cc071d6cfdfdb678bf3d83d766851de95abaf", "refsource": "MISC", "url": "https://github.com/rust-lang/rust/pull/93110/commits/406cc071d6cfdfdb678bf3d83d766851de95abaf" }, { "name": "https://github.com/rust-lang/rust/pull/93110/commits/4f0ad1c92ca08da6e8dc17838070975762f59714", "refsource": "MISC", "url": "https://github.com/rust-lang/rust/pull/93110/commits/4f0ad1c92ca08da6e8dc17838070975762f59714" }, { "name": "https://blog.rust-lang.org/2022/01/20/cve-2022-21658.html", "refsource": "MISC", "url": "https://blog.rust-lang.org/2022/01/20/cve-2022-21658.html" }, { "name": "FEDORA-2022-1bafa3fc91", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BK32QZLHDC2OVLPKTUHNT2G3VHWHD4LX/" }, { "name": "FEDORA-2022-2c73789458", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C63NH72Q7UHJM5V3IVYRI7LVBGGFQMSQ/" }, { "name": "FEDORA-2022-1b76e3a192", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CKGTACKMKAPRDPWPTU26GYWBELIRFF5N/" }, { "name": "FEDORA-2022-06569a0a60", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7JKZDTBMGAWIFJSNWKBMPO5EAKRR4BEW/" }, { "name": "https://support.apple.com/kb/HT213183", "refsource": "CONFIRM", "url": "https://support.apple.com/kb/HT213183" }, { "name": "https://support.apple.com/kb/HT213182", "refsource": "CONFIRM", "url": "https://support.apple.com/kb/HT213182" }, { "name": "https://support.apple.com/kb/HT213186", "refsource": "CONFIRM", "url": "https://support.apple.com/kb/HT213186" }, { "name": "https://support.apple.com/kb/HT213193", "refsource": "CONFIRM", "url": "https://support.apple.com/kb/HT213193" }, { "name": "GLSA-202210-09", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/202210-09" } ] }, "source": { "advisory": "GHSA-r9cc-f5pr-p3j2", "discovery": "UNKNOWN" } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:rust-lang:rust:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "1.58.0", "versionStartIncluding": "1.0.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "12.3", "versionStartIncluding": "12.0.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "15.4", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "15.4", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "15.4", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "8.5", "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2022-21658" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "Rust is a multi-paradigm, general-purpose programming language designed for performance and safety, especially safe concurrency. The Rust Security Response WG was notified that the `std::fs::remove_dir_all` standard library function is vulnerable a race condition enabling symlink following (CWE-363). An attacker could use this security issue to trick a privileged program into deleting files and directories the attacker couldn\u0027t otherwise access or delete. Rust 1.0.0 through Rust 1.58.0 is affected by this vulnerability with 1.58.1 containing a patch. Note that the following build targets don\u0027t have usable APIs to properly mitigate the attack, and are thus still vulnerable even with a patched toolchain: macOS before version 10.10 (Yosemite) and REDOX. We recommend everyone to update to Rust 1.58.1 as soon as possible, especially people developing programs expected to run in privileged contexts (including system daemons and setuid binaries), as those have the highest risk of being affected by this. Note that adding checks in your codebase before calling remove_dir_all will not mitigate the vulnerability, as they would also be vulnerable to race conditions like remove_dir_all itself. The existing mitigation is working as intended outside of race conditions." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-363" }, { "lang": "en", "value": "CWE-367" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/rust-lang/rust/pull/93110", "refsource": "MISC", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/rust-lang/rust/pull/93110" }, { "name": "https://github.com/rust-lang/rust/pull/93110/commits/32ed6e599bb4722efefd78bbc9cd7ec4613cb946", "refsource": "MISC", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/rust-lang/rust/pull/93110/commits/32ed6e599bb4722efefd78bbc9cd7ec4613cb946" }, { "name": "https://github.com/rust-lang/rust/pull/93110/commits/406cc071d6cfdfdb678bf3d83d766851de95abaf", "refsource": "MISC", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/rust-lang/rust/pull/93110/commits/406cc071d6cfdfdb678bf3d83d766851de95abaf" }, { "name": "https://blog.rust-lang.org/2022/01/20/cve-2022-21658.html", "refsource": "MISC", "tags": [ "Exploit", "Mitigation", "Vendor Advisory" ], "url": "https://blog.rust-lang.org/2022/01/20/cve-2022-21658.html" }, { "name": "https://github.com/rust-lang/rust/pull/93110/commits/4f0ad1c92ca08da6e8dc17838070975762f59714", "refsource": "MISC", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/rust-lang/rust/pull/93110/commits/4f0ad1c92ca08da6e8dc17838070975762f59714" }, { "name": "https://github.com/rust-lang/rust/security/advisories/GHSA-r9cc-f5pr-p3j2", "refsource": "CONFIRM", "tags": [ "Exploit", "Mitigation", "Third Party Advisory" ], "url": "https://github.com/rust-lang/rust/security/advisories/GHSA-r9cc-f5pr-p3j2" }, { "name": "FEDORA-2022-1bafa3fc91", "refsource": "FEDORA", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BK32QZLHDC2OVLPKTUHNT2G3VHWHD4LX/" }, { "name": "FEDORA-2022-2c73789458", "refsource": "FEDORA", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C63NH72Q7UHJM5V3IVYRI7LVBGGFQMSQ/" }, { "name": "FEDORA-2022-1b76e3a192", "refsource": "FEDORA", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CKGTACKMKAPRDPWPTU26GYWBELIRFF5N/" }, { "name": "FEDORA-2022-06569a0a60", "refsource": "FEDORA", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7JKZDTBMGAWIFJSNWKBMPO5EAKRR4BEW/" }, { "name": "https://support.apple.com/kb/HT213183", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "https://support.apple.com/kb/HT213183" }, { "name": "https://support.apple.com/kb/HT213182", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "https://support.apple.com/kb/HT213182" }, { "name": "https://support.apple.com/kb/HT213193", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "https://support.apple.com/kb/HT213193" }, { "name": "https://support.apple.com/kb/HT213186", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "https://support.apple.com/kb/HT213186" }, { "name": "GLSA-202210-09", "refsource": "GENTOO", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/202210-09" } ] } }, "impact": { "baseMetricV2": { "acInsufInfo": false, "cvssV2": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 3.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:M/Au:N/C:N/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.4, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "LOW", "userInteractionRequired": false }, "baseMetricV3": { "cvssV3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.0, "impactScore": 5.2 } }, "lastModifiedDate": "2022-10-19T13:22Z", "publishedDate": "2022-01-20T18:15Z" } } }
ssa-277137
Vulnerability from csaf_siemens
Published
2025-04-08 00:00
Modified
2025-04-08 00:00
Summary
SSA-277137: Multiple Vulnerabilities in SIDIS Prime Before V4.0.700
Notes
Summary
SIDIS Prime before V4.0.700 is affected by multiple vulnerabilities in the components OpenSSL, SQLite, Boost C++ Libraries and several Microsoft components as described below.
Siemens has released a new version of SIDIS Prime and recommends to update to the latest version.
General Recommendations
As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens' operational guidelines for Industrial Security (Download:
https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.
Additional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity
Additional Resources
For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT: https://www.siemens.com/cert/advisories
Terms of Use
The use of Siemens Security Advisories is subject to the terms and conditions listed on: https://www.siemens.com/productcert/terms-of-use.
{ "document": { "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Disclosure is not limited. (TLPv2: TLP:CLEAR)", "tlp": { "label": "WHITE" } }, "lang": "en", "notes": [ { "category": "summary", "text": "SIDIS Prime before V4.0.700 is affected by multiple vulnerabilities in the components OpenSSL, SQLite, Boost C++ Libraries and several Microsoft components as described below.\n\nSiemens has released a new version of SIDIS Prime and recommends to update to the latest version.", "title": "Summary" }, { "category": "general", "text": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "title": "General Recommendations" }, { "category": "general", "text": "For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT: https://www.siemens.com/cert/advisories", "title": "Additional Resources" }, { "category": "legal_disclaimer", "text": "The use of Siemens Security Advisories is subject to the terms and conditions listed on: https://www.siemens.com/productcert/terms-of-use.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "productcert@siemens.com", "name": "Siemens ProductCERT", "namespace": "https://www.siemens.com" }, "references": [ { "category": "self", "summary": "SSA-277137: Multiple Vulnerabilities in SIDIS Prime Before V4.0.700 - HTML Version", "url": "https://cert-portal.siemens.com/productcert/html/ssa-277137.html" }, { "category": "self", "summary": "SSA-277137: Multiple Vulnerabilities in SIDIS Prime Before V4.0.700 - CSAF Version", "url": "https://cert-portal.siemens.com/productcert/csaf/ssa-277137.json" } ], "title": "SSA-277137: Multiple Vulnerabilities in SIDIS Prime Before V4.0.700", "tracking": { "current_release_date": "2025-04-08T00:00:00Z", "generator": { "engine": { "name": "Siemens ProductCERT CSAF Generator", "version": "1" } }, "id": "SSA-277137", "initial_release_date": "2025-04-08T00:00:00Z", "revision_history": [ { "date": "2025-04-08T00:00:00Z", "legacy_version": "1.0", "number": "1", "summary": "Publication Date" } ], "status": "interim", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV4.0.700", "product": { "name": "SIDIS Prime", "product_id": "1" } } ], "category": "product_name", "name": "SIDIS Prime" } ], "category": "vendor", "name": "Siemens" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-21658", "cwe": { "id": "CWE-363", "name": "Race Condition Enabling Link Following" }, "notes": [ { "category": "summary", "text": "Rust is a multi-paradigm, general-purpose programming language designed for performance and safety, especially safe concurrency. The Rust Security Response WG was notified that the `std::fs::remove_dir_all` standard library function is vulnerable a race condition enabling symlink following (CWE-363). An attacker could use this security issue to trick a privileged program into deleting files and directories the attacker couldn\u0027t otherwise access or delete. Rust 1.0.0 through Rust 1.58.0 is affected by this vulnerability with 1.58.1 containing a patch. Note that the following build targets don\u0027t have usable APIs to properly mitigate the attack, and are thus still vulnerable even with a patched toolchain: macOS before version 10.10 (Yosemite) and REDOX. We recommend everyone to update to Rust 1.58.1 as soon as possible, especially people developing programs expected to run in privileged contexts (including system daemons and setuid binaries), as those have the highest risk of being affected by this. Note that adding checks in your codebase before calling remove_dir_all will not mitigate the vulnerability, as they would also be vulnerable to race conditions like remove_dir_all itself. The existing mitigation is working as intended outside of race conditions.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V4.0.700 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:H", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2022-21658" }, { "cve": "CVE-2023-2975", "cwe": { "id": "CWE-354", "name": "Improper Validation of Integrity Check Value" }, "notes": [ { "category": "summary", "text": "Issue summary: The AES-SIV cipher implementation contains a bug that causes it to ignore empty associated data entries which are unauthenticated as a consequence. Impact summary: Applications that use the AES-SIV algorithm and want to authenticate empty data entries as associated data can be mislead by removing adding or reordering such empty entries as these are ignored by the OpenSSL implementation. We are currently unaware of any such applications. The AES-SIV algorithm allows for authentication of multiple associated data entries along with the encryption. To authenticate empty data the application has to call EVP_EncryptUpdate() (or EVP_CipherUpdate()) with NULL pointer as the output buffer and 0 as the input buffer length. The AES-SIV implementation in OpenSSL just returns success for such a call instead of performing the associated data authentication operation. The empty data thus will not be authenticated. As this issue does not affect non-empty associated data authentication and we expect it to be rare for an application to use empty associated data entries this is qualified as Low severity issue.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V4.0.700 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2023-2975" }, { "cve": "CVE-2023-3446", "cwe": { "id": "CWE-606", "name": "Unchecked Input for Loop Condition" }, "notes": [ { "category": "summary", "text": "Issue summary: Checking excessively long DH keys or parameters may be very slow. Impact summary: Applications that use the functions DH_check(), DH_check_ex() or EVP_PKEY_param_check() to check a DH key or DH parameters may experience long delays. Where the key or parameters that are being checked have been obtained from an untrusted source this may lead to a Denial of Service. The function DH_check() performs various checks on DH parameters. One of those checks confirms that the modulus (\u0027p\u0027 parameter) is not too large. Trying to use a very large modulus is slow and OpenSSL will not normally use a modulus which is over 10,000 bits in length. However the DH_check() function checks numerous aspects of the key or parameters that have been supplied. Some of those checks use the supplied modulus value even if it has already been found to be too large. An application that calls DH_check() and supplies a key or parameters obtained from an untrusted source could be vulernable to a Denial of Service attack. The function DH_check() is itself called by a number of other OpenSSL functions. An application calling any of those other functions may similarly be affected. The other functions affected by this are DH_check_ex() and EVP_PKEY_param_check(). Also vulnerable are the OpenSSL dhparam and pkeyparam command line applications when using the \u0027-check\u0027 option. The OpenSSL SSL/TLS implementation is not affected by this issue. The OpenSSL 3.0 and 3.1 FIPS providers are not affected by this issue.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V4.0.700 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2023-3446" }, { "cve": "CVE-2023-4807", "cwe": { "id": "CWE-440", "name": "Expected Behavior Violation" }, "notes": [ { "category": "summary", "text": "Issue summary: The POLY1305 MAC (message authentication code) implementation contains a bug that might corrupt the internal state of applications on the Windows 64 platform when running on newer X86_64 processors supporting the AVX512-IFMA instructions. Impact summary: If in an application that uses the OpenSSL library an attacker can influence whether the POLY1305 MAC algorithm is used, the application state might be corrupted with various application dependent consequences. The POLY1305 MAC (message authentication code) implementation in OpenSSL does not save the contents of non-volatile XMM registers on Windows 64 platform when calculating the MAC of data larger than 64 bytes. Before returning to the caller all the XMM registers are set to zero rather than restoring their previous content. The vulnerable code is used only on newer x86_64 processors supporting the AVX512-IFMA instructions. The consequences of this kind of internal application state corruption can be various - from no consequences, if the calling application does not depend on the contents of non-volatile XMM registers at all, to the worst consequences, where the attacker could get complete control of the application process. However given the contents of the registers are just zeroized so the attacker cannot put arbitrary values inside, the most likely consequence, if any, would be an incorrect result of some application dependent calculations or a crash leading to a denial of service. The POLY1305 MAC algorithm is most frequently used as part of the CHACHA20-POLY1305 AEAD (authenticated encryption with associated data) algorithm. The most common usage of this AEAD cipher is with TLS protocol versions 1.2 and 1.3 and a malicious client can influence whether this AEAD cipher is used by the server. This implies that server applications using OpenSSL can be potentially impacted. However we are currently not aware of any concrete application that would be affected by this issue therefore we consider this a Low severity security issue. As a workaround the AVX512-IFMA instructions support can be disabled at runtime by setting the environment variable OPENSSL_ia32cap: OPENSSL_ia32cap=:~0x200000 The FIPS provider is not affected by this issue.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V4.0.700 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2023-4807" }, { "cve": "CVE-2023-5363", "cwe": { "id": "CWE-684", "name": "Incorrect Provision of Specified Functionality" }, "notes": [ { "category": "summary", "text": "Issue summary: A bug has been identified in the processing of key and initialisation vector (IV) lengths. This can lead to potential truncation or overruns during the initialisation of some symmetric ciphers. Impact summary: A truncation in the IV can result in non-uniqueness, which could result in loss of confidentiality for some cipher modes. When calling EVP_EncryptInit_ex2(), EVP_DecryptInit_ex2() or EVP_CipherInit_ex2() the provided OSSL_PARAM array is processed after the key and IV have been established. Any alterations to the key length, via the \"keylen\" parameter or the IV length, via the \"ivlen\" parameter, within the OSSL_PARAM array will not take effect as intended, potentially causing truncation or overreading of these values. The following ciphers and cipher modes are impacted: RC2, RC4, RC5, CCM, GCM and OCB. For the CCM, GCM and OCB cipher modes, truncation of the IV can result in loss of confidentiality. For example, when following NIST\u0027s SP 800-38D section 8.2.1 guidance for constructing a deterministic IV for AES in GCM mode, truncation of the counter portion could lead to IV reuse. Both truncations and overruns of the key and overruns of the IV will produce incorrect results and could, in some cases, trigger a memory exception. However, these issues are not currently assessed as security critical. Changing the key and/or IV lengths is not considered to be a common operation and the vulnerable API was recently introduced. Furthermore it is likely that application developers will have spotted this problem during testing since decryption would fail unless both peers in the communication were similarly vulnerable. For these reasons we expect the probability of an application being vulnerable to this to be quite low. However if an application is vulnerable then this issue is considered very serious. For these reasons we have assessed this issue as Moderate severity overall. The OpenSSL SSL/TLS implementation is not affected by this issue. The OpenSSL 3.0 and 3.1 FIPS providers are not affected by this because the issue lies outside of the FIPS provider boundary. OpenSSL 3.1 and 3.0 are vulnerable to this issue.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V4.0.700 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2023-5363" }, { "cve": "CVE-2023-5678", "cwe": { "id": "CWE-606", "name": "Unchecked Input for Loop Condition" }, "notes": [ { "category": "summary", "text": "Issue summary: Generating excessively long X9.42 DH keys or checking excessively long X9.42 DH keys or parameters may be very slow. Impact summary: Applications that use the functions DH_generate_key() to generate an X9.42 DH key may experience long delays. Likewise, applications that use DH_check_pub_key(), DH_check_pub_key_ex() or EVP_PKEY_public_check() to check an X9.42 DH key or X9.42 DH parameters may experience long delays. Where the key or parameters that are being checked have been obtained from an untrusted source this may lead to a Denial of Service. While DH_check() performs all the necessary checks (as of CVE-2023-3817), DH_check_pub_key() doesn\u0027t make any of these checks, and is therefore vulnerable for excessively large P and Q parameters. Likewise, while DH_generate_key() performs a check for an excessively large P, it doesn\u0027t check for an excessively large Q. An application that calls DH_generate_key() or DH_check_pub_key() and supplies a key or parameters obtained from an untrusted source could be vulnerable to a Denial of Service attack. DH_generate_key() and DH_check_pub_key() are also called by a number of other OpenSSL functions. An application calling any of those other functions may similarly be affected. The other functions affected by this are DH_check_pub_key_ex(), EVP_PKEY_public_check(), and EVP_PKEY_generate(). Also vulnerable are the OpenSSL pkey command line application when using the \"-pubcheck\" option, as well as the OpenSSL genpkey command line application. The OpenSSL SSL/TLS implementation is not affected by this issue. The OpenSSL 3.0 and 3.1 FIPS providers are not affected by this issue.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V4.0.700 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2023-5678" }, { "cve": "CVE-2023-7104", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "notes": [ { "category": "summary", "text": "A vulnerability was found in SQLite SQLite3 up to 3.43.0 and classified as critical. This issue affects the function sessionReadRecord of the file ext/session/sqlite3session.c of the component make alltest Handler. The manipulation leads to heap-based buffer overflow. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-248999.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V4.0.700 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2023-7104" }, { "cve": "CVE-2024-0056", "cwe": { "id": "CWE-319", "name": "Cleartext Transmission of Sensitive Information" }, "notes": [ { "category": "summary", "text": "Microsoft.Data.SqlClient and System.Data.SqlClient SQL Data Provider Security Feature Bypass Vulnerability", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V4.0.700 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2024-0056" }, { "cve": "CVE-2024-0232", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "A heap use-after-free issue has been identified in SQLite in the jsonParseAddNodeArray() function in sqlite3.c. This flaw allows a local attacker to leverage a victim to pass specially crafted malicious input to the application, potentially causing a crash and leading to a denial of service.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V4.0.700 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2024-0232" }, { "cve": "CVE-2024-0727", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "Issue summary: Processing a maliciously formatted PKCS12 file may lead OpenSSL to crash leading to a potential Denial of Service attack Impact summary: Applications loading files in the PKCS12 format from untrusted sources might terminate abruptly. A file in PKCS12 format can contain certificates and keys and may come from an untrusted source. The PKCS12 specification allows certain fields to be NULL, but OpenSSL does not correctly check for this case. This can lead to a NULL pointer dereference that results in OpenSSL crashing. If an application processes PKCS12 files from an untrusted source using the OpenSSL APIs then that application will be vulnerable to this issue. OpenSSL APIs that are vulnerable to this are: PKCS12_parse(), PKCS12_unpack_p7data(), PKCS12_unpack_p7encdata(), PKCS12_unpack_authsafes() and PKCS12_newpass(). We have also fixed a similar issue in SMIME_write_PKCS7(). However since this function is related to writing data we do not consider it security significant. The FIPS modules in 3.2, 3.1 and 3.0 are not affected by this issue.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V4.0.700 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2024-0727" }, { "cve": "CVE-2024-5535", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "summary", "text": "Issue summary: Calling the OpenSSL API function SSL_select_next_proto with an empty supported client protocols buffer may cause a crash or memory contents to be sent to the peer. Impact summary: A buffer overread can have a range of potential consequences such as unexpected application beahviour or a crash. In particular this issue could result in up to 255 bytes of arbitrary private data from memory being sent to the peer leading to a loss of confidentiality. However, only applications that directly call the SSL_select_next_proto function with a 0 length list of supported client protocols are affected by this issue. This would normally never be a valid scenario and is typically not under attacker control but may occur by accident in the case of a configuration or programming error in the calling application. The OpenSSL API function SSL_select_next_proto is typically used by TLS applications that support ALPN (Application Layer Protocol Negotiation) or NPN (Next Protocol Negotiation). NPN is older, was never standardised and is deprecated in favour of ALPN. We believe that ALPN is significantly more widely deployed than NPN. The SSL_select_next_proto function accepts a list of protocols from the server and a list of protocols from the client and returns the first protocol that appears in the server list that also appears in the client list. In the case of no overlap between the two lists it returns the first item in the client list. In either case it will signal whether an overlap between the two lists was found. In the case where SSL_select_next_proto is called with a zero length client list it fails to notice this condition and returns the memory immediately following the client list pointer (and reports that there was no overlap in the lists). This function is typically called from a server side application callback for ALPN or a client side application callback for NPN. In the case of ALPN the list of protocols supplied by the client is guaranteed by libssl to never be zero in length. The list of server protocols comes from the application and should never normally be expected to be of zero length. In this case if the SSL_select_next_proto function has been called as expected (with the list supplied by the client passed in the client/client_len parameters), then the application will not be vulnerable to this issue. If the application has accidentally been configured with a zero length server list, and has accidentally passed that zero length server list in the client/client_len parameters, and has additionally failed to correctly handle a \"no overlap\" response (which would normally result in a handshake failure in ALPN) then it will be vulnerable to this problem. In the case of NPN, the protocol permits the client to opportunistically select a protocol when there is no overlap. OpenSSL returns the first client protocol in the no overlap case in support of this. The list of client protocols comes from the application and should never normally be expected to be of zero length. However if the SSL_select_next_proto function is accidentally called with a client_len of 0 then an invalid memory pointer will be returned instead. If the application uses this output as the opportunistic protocol then the loss of confidentiality will occur. This issue has been assessed as Low severity because applications are most likely to be vulnerable if they are using NPN instead of ALPN - but NPN is not widely used. It also requires an application configuration or programming error. Finally, this issue would not typically be under attacker control making active exploitation unlikely. The FIPS modules in 3.3, 3.2, 3.1 and 3.0 are not affected by this issue. Due to the low severity of this issue we are not issuing new releases of OpenSSL at this time. The fix will be included in the next releases when they become available.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V4.0.700 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2024-5535" }, { "cve": "CVE-2024-9143", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "Issue summary: Use of the low-level GF(2m) elliptic curve APIs with untrusted explicit values for the field polynomial can lead to out-of-bounds memory reads or writes. Impact summary: Out of bound memory writes can lead to an application crash or even a possibility of a remote code execution, however, in all the protocols involving Elliptic Curve Cryptography that we\u0027re aware of, either only \"named curves\" are supported, or, if explicit curve parameters are supported, they specify an X9.62 encoding of binary (GF(2m)) curves that can\u0027t represent problematic input values. Thus the likelihood of existence of a vulnerable application is low. In particular, the X9.62 encoding is used for ECC keys in X.509 certificates, so problematic inputs cannot occur in the context of processing X.509 certificates. Any problematic use-cases would have to be using an \"exotic\" curve encoding. The affected APIs include: EC_GROUP_new_curve_GF2m(), EC_GROUP_new_from_params(), and various supporting BN_GF2m_*() functions. Applications working with \"exotic\" explicit binary (GF(2m)) curve parameters, that make it possible to represent invalid field polynomials with a zero constant term, via the above or similar APIs, may terminate abruptly as a result of reading or writing outside of array bounds. Remote code execution cannot easily be ruled out. The FIPS modules in 3.3, 3.2, 3.1 and 3.0 are not affected by this issue.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V4.0.700 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2024-9143" }, { "cve": "CVE-2024-21319", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "Microsoft Identity Denial of service vulnerability.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V4.0.700 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2024-21319" }, { "cve": "CVE-2024-30105", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "summary", "text": ".NET and Visual Studio Denial of Service Vulnerability", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V4.0.700 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2024-30105" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…