Skip to content

Commit a4cdfdf

Browse files
authored
Merge pull request #919 from pierwill/edit-cve-2022-21658
Fix typo in CVE-2022-21658 post
2 parents 2f32d33 + 0620858 commit a4cdfdf

File tree

1 file changed

+3
-2
lines changed

1 file changed

+3
-2
lines changed

posts/2022-01-20-cve-2022-21658.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ author: The Rust Security Response WG
1010
[advisory]: https://groups.google.com/g/rustlang-security-announcements/c/R1fZFDhnJVQ
1111

1212
The Rust Security Response WG was notified that the `std::fs::remove_dir_all`
13-
standard library function is vulnerable a race condition enabling symlink
13+
standard library function is vulnerable to a race condition enabling symlink
1414
following (CWE-363). An attacker could use this security issue to trick a
1515
privileged program into deleting files and directories the attacker couldn't
1616
otherwise access or delete.
@@ -29,7 +29,7 @@ follow the symlink from `temp/foo` to `sensitive/` while recursively deleting,
2929
resulting in `sensitive/` being deleted.
3030

3131
To prevent such attacks, `std::fs::remove_dir_all` already includes protection
32-
to avoid recursively deleting symlinks, as described in its documentation:
32+
to avoid recursively deleting symlinks, as described in [its documentation][4]:
3333

3434
> This function does **not** follow symbolic links and it will simply remove
3535
> the symbolic link itself.
@@ -87,3 +87,4 @@ Crichton for writing the WASI fix, and Mara Bos for reviewing the patches.
8787
[1]: https://www.cve.org/CVERecord?id=CVE-2022-21658
8888
[2]: https://github.com/rust-lang/wg-security-response/tree/master/patches/CVE-2022-21658
8989
[3]: https://www.rust-lang.org/policies/security
90+
[4]: https://doc.rust-lang.org/std/fs/fn.remove_dir_all.html

0 commit comments

Comments
 (0)