Multiple vulnerabilities have been found in Rust, the worst which may allow local attackers to execute arbitrary code.
Package | dev-lang/rust on all architectures |
---|---|
Affected versions | < 1.29.1 |
Unaffected versions | >= 1.29.1 |
Package | dev-lang/rust-bin on all architectures |
---|---|
Affected versions | < 1.29.1 |
Unaffected versions | >= 1.29.1 |
A systems programming language that runs blazingly fast, prevents segfaults, and guarantees thread safety.
Multiple vulnerabilities have been discovered in Rust. Please review the CVE identifiers referenced below for details.
A remote attacker able to control the value passed to Rust’s str::repeat function could possibly cause a Denial of Service condition.
In addition, a local attacker could trick another user into executing arbitrary code when using rustdoc.
There is no known workaround at this time.
All Rust users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=dev-lang/rust-1.29.1"
All Rust binary users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=dev-lang/rust-bin-1.29.1"
Release date
December 30, 2018
Latest revision
December 30, 2018: 1
Severity
normal
Exploitable
local, remote
Bugzilla entries