Vulnerable Library - xtask-0.1.0.crate
Vulnerabilities
CVE |
Severity |
CVSS |
Dependency |
Type |
Fixed in (xtask version) |
Remediation Available |
WS-2023-0027 |
High |
9.8 |
tokio-1.21.1.crate |
Transitive |
N/A* |
โ |
CVE-2023-22466 |
Medium |
5.4 |
tokio-1.21.1.crate |
Transitive |
N/A* |
โ |
*For some transitive vulnerabilities, there is no version of direct dependency with a fix. Check the section "Details" below to see if there is a version of transitive dependency where vulnerability is fixed.
Details
WS-2023-0027
Vulnerable Library - tokio-1.21.1.crate
An event-driven, non-blocking I/O platform for writing asynchronous I/O
backed applications.
Library home page: https://crates.io/api/v1/crates/tokio/1.21.1/download
Dependency Hierarchy:
- xtask-0.1.0.crate (Root Library)
- reqwest-0.11.11.crate
- h2-0.3.14.crate
- โ tokio-1.21.1.crate (Vulnerable Library)
Found in base branch: main
Vulnerability Details
A soundness issue was discovered in tokio. tokio::io::ReadHalf::unsplit can violate the Pin contract. Specific set of conditions needed to trigger an issue (a !Unpin type in ReadHalf) is unusual, combined with the difficulty of making any arbitrary use-after-free exploitable in Rust without doing a lot of careful alignment of data types in the surrounding code. The tokio feature io-util is also required to be enabled to trigger this soundness issue.
Publish Date: 2023-02-02
URL: WS-2023-0027
CVSS 3 Score Details (9.8)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
For more information on CVSS3 Scores, click here.
Suggested Fix
Type: Upgrade version
Origin: https://rustsec.org/advisories/RUSTSEC-2023-0005.html
Release Date: 2023-02-02
Fix Resolution: tokio - 1.18.5,1.20.4,1.24.2
Step up your Open Source Security Game with Mend here
CVE-2023-22466
Vulnerable Library - tokio-1.21.1.crate
An event-driven, non-blocking I/O platform for writing asynchronous I/O
backed applications.
Library home page: https://crates.io/api/v1/crates/tokio/1.21.1/download
Dependency Hierarchy:
- xtask-0.1.0.crate (Root Library)
- reqwest-0.11.11.crate
- h2-0.3.14.crate
- โ tokio-1.21.1.crate (Vulnerable Library)
Found in base branch: main
Vulnerability Details
Tokio is a runtime for writing applications with Rust. Starting with version 1.7.0 and prior to versions 1.18.4, 1.20.3, and 1.23.1, when configuring a Windows named pipe server, setting pipe_mode
will reset reject_remote_clients
to false
. If the application has previously configured reject_remote_clients
to true
, this effectively undoes the configuration. Remote clients may only access the named pipe if the named pipe's associated path is accessible via a publicly shared folder (SMB). Versions 1.23.1, 1.20.3, and 1.18.4 have been patched. The fix will also be present in all releases starting from version 1.24.0. Named pipes were introduced to Tokio in version 1.7.0, so releases older than 1.7.0 are not affected. As a workaround, ensure that pipe_mode
is set first after initializing a ServerOptions
.
Publish Date: 2023-01-04
URL: CVE-2023-22466
CVSS 3 Score Details (5.4)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: Low
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: Low
- Availability Impact: None
For more information on CVSS3 Scores, click here.
Suggested Fix
Type: Upgrade version
Origin: GHSA-7rrj-xr53-82p7
Release Date: 2023-01-04
Fix Resolution: tokio - 1.18.4,1.20.3,1.23.1
Step up your Open Source Security Game with Mend here