<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for rust1.71</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE-SU-2023:3251-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2023-08-08T20:15:23Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2023-08-08T20:15:23Z</InitialReleaseDate>
    <CurrentReleaseDate>2023-08-08T20:15:23Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for rust1.71</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for rust1.71 fixes the following issues:

Update to version 1.71.1:

- CVE-2023-38497: Fixed privilege escalation with Cargo not respecting umask when extracting dependencies (bsc#1213817).
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">SUSE-2023-3251,SUSE-SLE-Module-Development-Tools-15-SP4-2023-3251,SUSE-SLE-Module-Development-Tools-15-SP5-2023-3251,openSUSE-SLE-15.4-2023-3251,openSUSE-SLE-15.5-2023-3251</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/update/announcement/2023/suse-su-20233251-1/</URL>
      <Description>Link for SUSE-SU-2023:3251-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://lists.suse.com/pipermail/sle-security-updates/2023-August/015829.html</URL>
      <Description>E-Mail link for SUSE-SU-2023:3251-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1213817</URL>
      <Description>SUSE Bug 1213817</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-38497/</URL>
      <Description>SUSE CVE CVE-2023-38497 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Module for Development Tools 15 SP4">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Module for Development Tools 15 SP4">
        <FullProductName ProductID="SUSE Linux Enterprise Module for Development Tools 15 SP4" CPE="cpe:/o:suse:sle-module-development-tools:15:sp4">SUSE Linux Enterprise Module for Development Tools 15 SP4</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Module for Development Tools 15 SP5">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Module for Development Tools 15 SP5">
        <FullProductName ProductID="SUSE Linux Enterprise Module for Development Tools 15 SP5" CPE="cpe:/o:suse:sle-module-development-tools:15:sp5">SUSE Linux Enterprise Module for Development Tools 15 SP5</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="openSUSE Leap 15.4">
      <Branch Type="Product Name" Name="openSUSE Leap 15.4">
        <FullProductName ProductID="openSUSE Leap 15.4" CPE="cpe:/o:opensuse:leap:15.4">openSUSE Leap 15.4</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="openSUSE Leap 15.5">
      <Branch Type="Product Name" Name="openSUSE Leap 15.5">
        <FullProductName ProductID="openSUSE Leap 15.5" CPE="cpe:/o:opensuse:leap:15.5">openSUSE Leap 15.5</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="cargo1.71-1.71.1-150400.9.6.1">
      <FullProductName ProductID="cargo1.71-1.71.1-150400.9.6.1">cargo1.71-1.71.1-150400.9.6.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="rust1.71-1.71.1-150400.9.6.1">
      <FullProductName ProductID="rust1.71-1.71.1-150400.9.6.1">rust1.71-1.71.1-150400.9.6.1</FullProductName>
    </Branch>
    <Relationship ProductReference="cargo1.71-1.71.1-150400.9.6.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for Development Tools 15 SP4">
      <FullProductName ProductID="SUSE Linux Enterprise Module for Development Tools 15 SP4:cargo1.71-1.71.1-150400.9.6.1">cargo1.71-1.71.1-150400.9.6.1 as a component of SUSE Linux Enterprise Module for Development Tools 15 SP4</FullProductName>
    </Relationship>
    <Relationship ProductReference="rust1.71-1.71.1-150400.9.6.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for Development Tools 15 SP4">
      <FullProductName ProductID="SUSE Linux Enterprise Module for Development Tools 15 SP4:rust1.71-1.71.1-150400.9.6.1">rust1.71-1.71.1-150400.9.6.1 as a component of SUSE Linux Enterprise Module for Development Tools 15 SP4</FullProductName>
    </Relationship>
    <Relationship ProductReference="cargo1.71-1.71.1-150400.9.6.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for Development Tools 15 SP5">
      <FullProductName ProductID="SUSE Linux Enterprise Module for Development Tools 15 SP5:cargo1.71-1.71.1-150400.9.6.1">cargo1.71-1.71.1-150400.9.6.1 as a component of SUSE Linux Enterprise Module for Development Tools 15 SP5</FullProductName>
    </Relationship>
    <Relationship ProductReference="rust1.71-1.71.1-150400.9.6.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for Development Tools 15 SP5">
      <FullProductName ProductID="SUSE Linux Enterprise Module for Development Tools 15 SP5:rust1.71-1.71.1-150400.9.6.1">rust1.71-1.71.1-150400.9.6.1 as a component of SUSE Linux Enterprise Module for Development Tools 15 SP5</FullProductName>
    </Relationship>
    <Relationship ProductReference="cargo1.71-1.71.1-150400.9.6.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.4">
      <FullProductName ProductID="openSUSE Leap 15.4:cargo1.71-1.71.1-150400.9.6.1">cargo1.71-1.71.1-150400.9.6.1 as a component of openSUSE Leap 15.4</FullProductName>
    </Relationship>
    <Relationship ProductReference="rust1.71-1.71.1-150400.9.6.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.4">
      <FullProductName ProductID="openSUSE Leap 15.4:rust1.71-1.71.1-150400.9.6.1">rust1.71-1.71.1-150400.9.6.1 as a component of openSUSE Leap 15.4</FullProductName>
    </Relationship>
    <Relationship ProductReference="cargo1.71-1.71.1-150400.9.6.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.5">
      <FullProductName ProductID="openSUSE Leap 15.5:cargo1.71-1.71.1-150400.9.6.1">cargo1.71-1.71.1-150400.9.6.1 as a component of openSUSE Leap 15.5</FullProductName>
    </Relationship>
    <Relationship ProductReference="rust1.71-1.71.1-150400.9.6.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.5">
      <FullProductName ProductID="openSUSE Leap 15.5:rust1.71-1.71.1-150400.9.6.1">rust1.71-1.71.1-150400.9.6.1 as a component of openSUSE Leap 15.5</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Cargo downloads the Rust project's dependencies and compiles the project. Cargo prior to version 0.72.2, bundled with Rust prior to version 1.71.1, did not respect the umask when extracting crate archives on UNIX-like systems. If the user downloaded a crate containing files writeable by any local user, another local user could exploit this to change the source code compiled and executed by the current user. To prevent existing cached extractions from being exploitable, the Cargo binary version 0.72.2 included in Rust 1.71.1 or later will purge caches generated by older Cargo versions automatically. As a workaround, configure one's system to prevent other local users from accessing the Cargo directory, usually located in `~/.cargo`.</Note>
    </Notes>
    <CVE>CVE-2023-38497</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Module for Development Tools 15 SP4:cargo1.71-1.71.1-150400.9.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Development Tools 15 SP4:rust1.71-1.71.1-150400.9.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Development Tools 15 SP5:cargo1.71-1.71.1-150400.9.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Development Tools 15 SP5:rust1.71-1.71.1-150400.9.6.1</ProductID>
        <ProductID>openSUSE Leap 15.4:cargo1.71-1.71.1-150400.9.6.1</ProductID>
        <ProductID>openSUSE Leap 15.4:rust1.71-1.71.1-150400.9.6.1</ProductID>
        <ProductID>openSUSE Leap 15.5:cargo1.71-1.71.1-150400.9.6.1</ProductID>
        <ProductID>openSUSE Leap 15.5:rust1.71-1.71.1-150400.9.6.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2023/suse-su-20233251-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-38497.html</URL>
        <Description>CVE-2023-38497</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1213817</URL>
        <Description>SUSE Bug 1213817</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
