A rust-toolset:rhel8 security update has been released for AlmaLinux.
ALSA-2021:4590 Moderate: rust-toolset:rhel8 security update
Type:
security
Severity:
moderate
Release date:
2021-11-12
Description
Security Fix(es):
* Developer environment: Unicode's bidirectional (BiDi) override characters can cause trojan source attacks (CVE-2021-42574)
The following changes were introduced in rust in order to facilitate detection of BiDi Unicode characters:
Rust introduces two new lints to detect and reject code containing the affected codepoints. These new deny-by-default lints detect affected codepoints in string literals and comments. The lints will prevent source code file containing these codepoints from being compiled. If your code has legitimate uses for the codepoints we recommend replacing them with the related escape sequence. The error messages will suggest the right escapes to use.
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
References:
CVE-2021-42574
Updates packages:
cargo-1.54.0-3.module_el8.5.0+2599+d655d86c.x86_64.rpm
cargo-doc-1.54.0-3.module_el8.5.0+2599+d655d86c.noarch.rpm
clippy-1.54.0-3.module_el8.5.0+2599+d655d86c.x86_64.rpm
rls-1.54.0-3.module_el8.5.0+2599+d655d86c.x86_64.rpm
rust-1.54.0-3.module_el8.5.0+2599+d655d86c.x86_64.rpm
rust-analysis-1.54.0-3.module_el8.5.0+2599+d655d86c.x86_64.rpm
rust-debugger-common-1.54.0-3.module_el8.5.0+2599+d655d86c.noarch.rpm
rust-doc-1.54.0-3.module_el8.5.0+2599+d655d86c.x86_64.rpm
rust-gdb-1.54.0-3.module_el8.5.0+2599+d655d86c.noarch.rpm
rust-lldb-1.54.0-3.module_el8.5.0+2599+d655d86c.noarch.rpm
rust-src-1.54.0-3.module_el8.5.0+2599+d655d86c.noarch.rpm
rust-std-static-1.54.0-3.module_el8.5.0+2599+d655d86c.x86_64.rpm
rust-std-static-wasm32-unknown-unknown-1.54.0-3.module_el8.5.0+2599+d655d86c.x86_64.rpm
rust-toolset-1.54.0-1.module_el8.5.0+2599+d655d86c.x86_64.rpm
rustfmt-1.54.0-3.module_el8.5.0+2599+d655d86c.x86_64.rpm
Notes:
This page is generated automatically and has not been checked for errors. For clarification or corrections please contact the AlmaLinux Packaging Team.