![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.1.10.2021.0251 |
Category: | Mageia Linux Local Security Checks |
Title: | Mageia: Security Advisory (MGASA-2021-0251) |
Summary: | The remote host is missing an update for the 'alacritty, cargo-c, dust, librsvg, mozjs68, mozjs78, neovim-gtk, ripgrep, rust' package(s) announced via the MGASA-2021-0251 advisory. |
Description: | Summary: The remote host is missing an update for the 'alacritty, cargo-c, dust, librsvg, mozjs68, mozjs78, neovim-gtk, ripgrep, rust' package(s) announced via the MGASA-2021-0251 advisory. Vulnerability Insight: This Rust update to version 1.52.1 includes security fixes for CVE-2020-36323, CVE-2021-28876, CVE-2021-28878, CVE-2021-28879, and CVE-2021-31162. These are memory safety bugs in the Rust standard library. Because it is statically linked, affected applications will need to be rebuilt to benefit from the fixes. The actual security implications will depend on how these APIs are used in each particular case. This update also provides new features and bugfixes included in Rust since the previously packaged version 1.49.0. See the referenced release notes for details. The mozjs78 package is also updated from version 78.7.0 to 78.11.0 (ESR). Affected Software/OS: 'alacritty, cargo-c, dust, librsvg, mozjs68, mozjs78, neovim-gtk, ripgrep, rust' package(s) on Mageia 8. Solution: Please install the updated package(s). CVSS Score: 7.5 CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P |
Cross-Ref: |
Common Vulnerability Exposure (CVE) ID: CVE-2020-36323 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VZG65GUW6Z2CYOQHF7T3TB5CZKIX6ZJE/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CZ337CM4GFJLRDFVQCGC7J25V65JXOG5/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TFUO3URYCO73D2Q4WYJBWAMJWGGVXQO4/ https://github.com/rust-lang/rust/pull/81728#issuecomment-821549174 https://github.com/rust-lang/rust/pull/81728#issuecomment-824904190 https://github.com/rust-lang/rust/issues/80335 https://github.com/rust-lang/rust/pull/81728 Common Vulnerability Exposure (CVE) ID: CVE-2021-28876 https://security.gentoo.org/glsa/202210-09 https://github.com/rust-lang/rust/issues/81740 https://github.com/rust-lang/rust/pull/81741 Common Vulnerability Exposure (CVE) ID: CVE-2021-28878 https://github.com/rust-lang/rust/issues/82291 https://github.com/rust-lang/rust/pull/82292 Common Vulnerability Exposure (CVE) ID: CVE-2021-28879 https://github.com/rust-lang/rust/issues/82282 https://github.com/rust-lang/rust/pull/82289 Common Vulnerability Exposure (CVE) ID: CVE-2021-31162 https://github.com/rust-lang/rust/issues/83618 https://github.com/rust-lang/rust/pull/83629 |
Copyright | Copyright (C) 2022 Greenbone AG |
This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |