Fedora Linux 8782 Published by

A rust security update has been released for Fedora 33.



SECURITY: Fedora 33 Update: rust-1.51.0-3.fc33


--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2021-b1ba54add6
2021-04-27 00:57:16.305002
--------------------------------------------------------------------------------

Name : rust
Product : Fedora 33
Version : 1.51.0
Release : 3.fc33
URL :   https://www.rust-lang.org
Summary : The Rust Programming Language
Description :
Rust is a systems programming language that runs blazingly fast, prevents
segfaults, and guarantees thread safety.

This package includes the Rust compiler and documentation generator.

--------------------------------------------------------------------------------
Update Information:

Security fixes for CVE-2020-36323, CVE-2021-28876, CVE-2021-28878,
CVE-2021-28879, and CVE-2021-31162. These are memory safety bugs in the Rust
standard library. Because it is statically linked, affected applications will
need to be rebuilt to benefit from the fixes. The actual security implications
will depend on how these APIs are used in each particular case.
--------------------------------------------------------------------------------
ChangeLog:

* Fri Apr 16 2021 Josh Stone - 1.51.0-3
- Security fixes for CVE-2020-36323, CVE-2021-31162
* Wed Apr 14 2021 Josh Stone - 1.51.0-2
- Security fixes for CVE-2021-28876, CVE-2021-28878, CVE-2021-28879
- Fix bootstrap for stage0 rust 1.51
--------------------------------------------------------------------------------
References:

[ 1 ] Bug #1949198 - CVE-2021-28876 rust: panic safety issue in Zip implementation
  https://bugzilla.redhat.com/show_bug.cgi?id=1949198
[ 2 ] Bug #1949207 - CVE-2021-28878 rust: memory safety violation in Zip implementation when next_back() and next() are used together
  https://bugzilla.redhat.com/show_bug.cgi?id=1949207
[ 3 ] Bug #1949211 - CVE-2021-28879 rust: integer overflow in the Zip implementation can lead to a buffer overflow
  https://bugzilla.redhat.com/show_bug.cgi?id=1949211
[ 4 ] Bug #1950396 - CVE-2020-36323 rust: optimization for joining strings can cause uninitialized bytes to be exposed
  https://bugzilla.redhat.com/show_bug.cgi?id=1950396
[ 5 ] Bug #1950398 - CVE-2021-31162 rust: double free in Vec::from_iter function if freeing the element panics
  https://bugzilla.redhat.com/show_bug.cgi?id=1950398
--------------------------------------------------------------------------------

This update can be installed with the "dnf" update program. Use
su -c 'dnf upgrade --advisory FEDORA-2021-b1ba54add6' at the command
line. For more information, refer to the dnf documentation available at
  http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
  https://fedoraproject.org/keys