Rust: Multiple Vulnerabilities — GLSA 202210-09

Multiple vulnerabilities have been discovered in Rust, the worst of which could result in denial of service.

Affected packages

dev-lang/rust on all architectures
Affected versions < 1.63.0-r1
Unaffected versions >= 1.63.0-r1
dev-lang/rust-bin on all architectures
Affected versions < 1.64.0
Unaffected versions >= 1.64.0

Background

A systems programming language that runs blazingly fast, prevents segfaults, and guarantees thread safety.

Description

Multiple vulnerabilities have been discovered in Rust. Please review the CVE identifiers referenced below for details.

Impact

Please review the referenced CVE identifiers for details.

Workaround

There is no known workaround at this time.

Resolution

All Rust users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=dev-lang/rust-1.63.0-r1"
 

All Rust binary users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=dev-lang/rust-bin-1.64.0"
 

In addition, users using Portage 3.0.38 or later should ensure that packages with Rust binaries have no vulnerable code statically linked into their binaries by rebuilding the @rust-rebuild set:

 # emerge --ask --oneshot --verbose @rust-rebuild
 

References

Release date
October 16, 2022

Latest revision
October 16, 2022: 1

Severity
normal

Exploitable
remote

Bugzilla entries