@@ -10,7 +10,7 @@ author: The Rust Security Response WG
10
10
[ advisory ] : https://groups.google.com/g/rustlang-security-announcements/c/R1fZFDhnJVQ
11
11
12
12
The Rust Security Response WG was notified that the ` std::fs::remove_dir_all `
13
- standard library function is vulneable a race condition enabling symlink
13
+ standard library function is vulnerable a race condition enabling symlink
14
14
following (CWE-363). An attacker could use this security issue to trick a
15
15
privileged program into deleting files and directories the attacker couldn't
16
16
otherwise access or delete.
@@ -50,7 +50,7 @@ able to reliably perform it within a couple of seconds.
50
50
Rust 1.0.0 through Rust 1.58.0 is affected by this vulnerability. We're going
51
51
to release Rust 1.58.1 later today, which will include mitigations for this
52
52
vulnerability. Patches to the Rust standard library are also available for
53
- custom-built Rust toolchains here (TODO: link) .
53
+ custom-built Rust toolchains [ here] [ 2 ] .
54
54
55
55
Note that the following targets don't have usable APIs to properly mitigate the
56
56
attack, and are thus still vulnerable even with a patched toolchain:
@@ -73,7 +73,7 @@ intended outside of race conditions.
73
73
## Acknowledgments
74
74
75
75
We want to thank Hans Kratz for independently discovering and disclosing this
76
- issue to us according to the [ Rust security policy] [ 2 ] , for developing the fix
76
+ issue to us according to the [ Rust security policy] [ 3 ] , for developing the fix
77
77
for UNIX-like targets and for reviewing fixes for other platforms.
78
78
79
79
We also want to thank Florian Weimer for reviewing the UNIX-like fix and for
@@ -85,4 +85,5 @@ and writing this advisory, Chris Denton for writing the Windows fix, Alex
85
85
Crichton for writing the WASI fix, and Mara Bos for reviewing the patches.
86
86
87
87
[ 1 ] : https://www.cve.org/CVERecord?id=CVE-2022-21658
88
- [ 2 ] : https://www.rust-lang.org/policies/security
88
+ [ 2 ] : https://github.com/rust-lang/wg-security-response/tree/master/patches/CVE-2022-21658
89
+ [ 3 ] : https://www.rust-lang.org/policies/security
0 commit comments