Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2021-38191 (GCVE-0-2021-38191)
Vulnerability from cvelistv5 – Published: 2021-08-08 05:09 – Updated: 2024-08-04 01:37- n/a
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T01:37:16.274Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://rustsec.org/advisories/RUSTSEC-2021-0072.html"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/tokio/RUSTSEC-2021-0072.md"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in the tokio crate before 1.8.1 for Rust. Upon a JoinHandle::abort, a Task may be dropped in the wrong thread."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2021-08-08T05:09:27.000Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://rustsec.org/advisories/RUSTSEC-2021-0072.html"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/tokio/RUSTSEC-2021-0072.md"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2021-38191",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "An issue was discovered in the tokio crate before 1.8.1 for Rust. Upon a JoinHandle::abort, a Task may be dropped in the wrong thread."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://rustsec.org/advisories/RUSTSEC-2021-0072.html",
"refsource": "MISC",
"url": "https://rustsec.org/advisories/RUSTSEC-2021-0072.html"
},
{
"name": "https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/tokio/RUSTSEC-2021-0072.md",
"refsource": "MISC",
"url": "https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/tokio/RUSTSEC-2021-0072.md"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2021-38191",
"datePublished": "2021-08-08T05:09:27.000Z",
"dateReserved": "2021-08-08T00:00:00.000Z",
"dateUpdated": "2024-08-04T01:37:16.274Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2021-38191",
"date": "2026-04-16",
"epss": "0.00341",
"percentile": "0.56862"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2021-38191\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2021-08-08T06:15:08.967\",\"lastModified\":\"2024-11-21T06:16:36.630\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"An issue was discovered in the tokio crate before 1.8.1 for Rust. Upon a JoinHandle::abort, a Task may be dropped in the wrong thread.\"},{\"lang\":\"es\",\"value\":\"Se ha detectado un problema en la crate tokio versiones anteriores a 1.8.1 para Rust. Tras una funci\u00f3n JoinHandle::abort, una Tarea puede ser lanzada en el hilo equivocado\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":5.9,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.2,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:N/I:N/A:P\",\"baseScore\":4.3,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-362\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tokio:tokio:*:*:*:*:*:rust:*:*\",\"versionStartIncluding\":\"0.3.0\",\"versionEndExcluding\":\"1.5.1\",\"matchCriteriaId\":\"B505EDA7-2107-4169-8D1E-CD2AAA038674\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tokio:tokio:*:*:*:*:*:rust:*:*\",\"versionStartIncluding\":\"1.6.0\",\"versionEndExcluding\":\"1.6.3\",\"matchCriteriaId\":\"033FFED8-23B5-451F-847E-475D961C6832\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tokio:tokio:*:*:*:*:*:rust:*:*\",\"versionStartIncluding\":\"1.7.0\",\"versionEndExcluding\":\"1.7.2\",\"matchCriteriaId\":\"FA62E77D-CAF1-40CF-B472-13CBCA974C07\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tokio:tokio:1.8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BE706735-E1D9-46AB-AAFD-C7DEFC58AD5D\"}]}]}],\"references\":[{\"url\":\"https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/tokio/RUSTSEC-2021-0072.md\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://rustsec.org/advisories/RUSTSEC-2021-0072.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\",\"Issue Tracking\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/tokio/RUSTSEC-2021-0072.md\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://rustsec.org/advisories/RUSTSEC-2021-0072.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Issue Tracking\",\"Patch\",\"Third Party Advisory\"]}]}}"
}
}
GSD-2021-38191
Vulnerability from gsd - Updated: 2023-12-13 01:23{
"GSD": {
"alias": "CVE-2021-38191",
"description": "An issue was discovered in the tokio crate before 1.8.1 for Rust. Upon a JoinHandle::abort, a Task may be dropped in the wrong thread.",
"id": "GSD-2021-38191",
"references": [
"https://www.suse.com/security/cve/CVE-2021-38191.html"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2021-38191"
],
"details": "An issue was discovered in the tokio crate before 1.8.1 for Rust. Upon a JoinHandle::abort, a Task may be dropped in the wrong thread.",
"id": "GSD-2021-38191",
"modified": "2023-12-13T01:23:17.721500Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2021-38191",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "An issue was discovered in the tokio crate before 1.8.1 for Rust. Upon a JoinHandle::abort, a Task may be dropped in the wrong thread."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://rustsec.org/advisories/RUSTSEC-2021-0072.html",
"refsource": "MISC",
"url": "https://rustsec.org/advisories/RUSTSEC-2021-0072.html"
},
{
"name": "https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/tokio/RUSTSEC-2021-0072.md",
"refsource": "MISC",
"url": "https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/tokio/RUSTSEC-2021-0072.md"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:tokio:tokio:*:*:*:*:*:rust:*:*",
"cpe_name": [],
"versionEndExcluding": "1.7.2",
"versionStartIncluding": "1.7.0",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:tokio:tokio:*:*:*:*:*:rust:*:*",
"cpe_name": [],
"versionEndExcluding": "1.6.3",
"versionStartIncluding": "1.6.0",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:tokio:tokio:*:*:*:*:*:rust:*:*",
"cpe_name": [],
"versionEndExcluding": "1.5.1",
"versionStartIncluding": "0.3.0",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:tokio:tokio:1.8.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2021-38191"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "An issue was discovered in the tokio crate before 1.8.1 for Rust. Upon a JoinHandle::abort, a Task may be dropped in the wrong thread."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-362"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/tokio/RUSTSEC-2021-0072.md",
"refsource": "MISC",
"tags": [
"Third Party Advisory"
],
"url": "https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/tokio/RUSTSEC-2021-0072.md"
},
{
"name": "https://rustsec.org/advisories/RUSTSEC-2021-0072.html",
"refsource": "MISC",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://rustsec.org/advisories/RUSTSEC-2021-0072.html"
}
]
}
},
"impact": {
"baseMetricV2": {
"acInsufInfo": false,
"cvssV2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"userInteractionRequired": false
},
"baseMetricV3": {
"cvssV3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.2,
"impactScore": 3.6
}
},
"lastModifiedDate": "2022-11-03T02:51Z",
"publishedDate": "2021-08-08T06:15Z"
}
}
}
CNVD-2021-61391
Vulnerability from cnvd - Published: 2021-08-12厂商已发布了漏洞修复程序,请及时关注更新: https://rustsec.org/advisories/RUSTSEC-2021-0072.html
| Name | Mozilla Rust <1.8.1 |
|---|
{
"cves": {
"cve": {
"cveNumber": "CVE-2021-38191"
}
},
"description": "Rust\u662fMozilla\u57fa\u91d1\u4f1a\u7684\u4e00\u6b3e\u901a\u7528\u3001\u7f16\u8bd1\u578b\u7f16\u7a0b\u8bed\u8a00\u3002\n\nMozilla Rus\u5b58\u5728\u62d2\u7edd\u670d\u52a1\uff0c\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u5bfc\u81f4\u62d2\u7edd\u670d\u52a1\u3002",
"formalWay": "\u5382\u5546\u5df2\u53d1\u5e03\u4e86\u6f0f\u6d1e\u4fee\u590d\u7a0b\u5e8f\uff0c\u8bf7\u53ca\u65f6\u5173\u6ce8\u66f4\u65b0\uff1a\r\nhttps://rustsec.org/advisories/RUSTSEC-2021-0072.html",
"isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
"number": "CNVD-2021-61391",
"openTime": "2021-08-12",
"patchDescription": "Rust\u662fMozilla\u57fa\u91d1\u4f1a\u7684\u4e00\u6b3e\u901a\u7528\u3001\u7f16\u8bd1\u578b\u7f16\u7a0b\u8bed\u8a00\u3002\r\n\r\nMozilla Rus\u5b58\u5728\u62d2\u7edd\u670d\u52a1\uff0c\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u5bfc\u81f4\u62d2\u7edd\u670d\u52a1\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
"patchName": "Mozilla Rust\u62d2\u7edd\u670d\u52a1\u6f0f\u6d1e\u7684\u8865\u4e01",
"products": {
"product": "Mozilla Rust \u003c1.8.1"
},
"referenceLink": "https://nvd.nist.gov/vuln/detail/CVE-2021-38191",
"serverity": "\u4e2d",
"submitTime": "2021-08-10",
"title": "Mozilla Rust\u62d2\u7edd\u670d\u52a1\u6f0f\u6d1e"
}
OPENSUSE-SU-2024:11751-1
Vulnerability from csaf_opensuse - Published: 2024-06-15 00:00 - Updated: 2024-06-15 00:00{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "afterburn-5.0.0-6.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the afterburn-5.0.0-6.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2024-11751",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_11751-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-35905 page",
"url": "https://www.suse.com/security/cve/CVE-2020-35905/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-36465 page",
"url": "https://www.suse.com/security/cve/CVE-2020-36465/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-27378 page",
"url": "https://www.suse.com/security/cve/CVE-2021-27378/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-32714 page",
"url": "https://www.suse.com/security/cve/CVE-2021-32714/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-32715 page",
"url": "https://www.suse.com/security/cve/CVE-2021-32715/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-38191 page",
"url": "https://www.suse.com/security/cve/CVE-2021-38191/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-45710 page",
"url": "https://www.suse.com/security/cve/CVE-2021-45710/"
}
],
"title": "afterburn-5.0.0-6.1 on GA media",
"tracking": {
"current_release_date": "2024-06-15T00:00:00Z",
"generator": {
"date": "2024-06-15T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2024:11751-1",
"initial_release_date": "2024-06-15T00:00:00Z",
"revision_history": [
{
"date": "2024-06-15T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "afterburn-5.0.0-6.1.aarch64",
"product": {
"name": "afterburn-5.0.0-6.1.aarch64",
"product_id": "afterburn-5.0.0-6.1.aarch64"
}
},
{
"category": "product_version",
"name": "afterburn-dracut-5.0.0-6.1.aarch64",
"product": {
"name": "afterburn-dracut-5.0.0-6.1.aarch64",
"product_id": "afterburn-dracut-5.0.0-6.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "afterburn-5.0.0-6.1.ppc64le",
"product": {
"name": "afterburn-5.0.0-6.1.ppc64le",
"product_id": "afterburn-5.0.0-6.1.ppc64le"
}
},
{
"category": "product_version",
"name": "afterburn-dracut-5.0.0-6.1.ppc64le",
"product": {
"name": "afterburn-dracut-5.0.0-6.1.ppc64le",
"product_id": "afterburn-dracut-5.0.0-6.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "afterburn-5.0.0-6.1.s390x",
"product": {
"name": "afterburn-5.0.0-6.1.s390x",
"product_id": "afterburn-5.0.0-6.1.s390x"
}
},
{
"category": "product_version",
"name": "afterburn-dracut-5.0.0-6.1.s390x",
"product": {
"name": "afterburn-dracut-5.0.0-6.1.s390x",
"product_id": "afterburn-dracut-5.0.0-6.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "afterburn-5.0.0-6.1.x86_64",
"product": {
"name": "afterburn-5.0.0-6.1.x86_64",
"product_id": "afterburn-5.0.0-6.1.x86_64"
}
},
{
"category": "product_version",
"name": "afterburn-dracut-5.0.0-6.1.x86_64",
"product": {
"name": "afterburn-dracut-5.0.0-6.1.x86_64",
"product_id": "afterburn-dracut-5.0.0-6.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "afterburn-5.0.0-6.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:afterburn-5.0.0-6.1.aarch64"
},
"product_reference": "afterburn-5.0.0-6.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "afterburn-5.0.0-6.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:afterburn-5.0.0-6.1.ppc64le"
},
"product_reference": "afterburn-5.0.0-6.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "afterburn-5.0.0-6.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:afterburn-5.0.0-6.1.s390x"
},
"product_reference": "afterburn-5.0.0-6.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "afterburn-5.0.0-6.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:afterburn-5.0.0-6.1.x86_64"
},
"product_reference": "afterburn-5.0.0-6.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "afterburn-dracut-5.0.0-6.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:afterburn-dracut-5.0.0-6.1.aarch64"
},
"product_reference": "afterburn-dracut-5.0.0-6.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "afterburn-dracut-5.0.0-6.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:afterburn-dracut-5.0.0-6.1.ppc64le"
},
"product_reference": "afterburn-dracut-5.0.0-6.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "afterburn-dracut-5.0.0-6.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:afterburn-dracut-5.0.0-6.1.s390x"
},
"product_reference": "afterburn-dracut-5.0.0-6.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "afterburn-dracut-5.0.0-6.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:afterburn-dracut-5.0.0-6.1.x86_64"
},
"product_reference": "afterburn-dracut-5.0.0-6.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-35905",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-35905"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the futures-util crate before 0.3.7 for Rust. MutexGuard::map can cause a data race for certain closure situations (in safe code).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:afterburn-5.0.0-6.1.aarch64",
"openSUSE Tumbleweed:afterburn-5.0.0-6.1.ppc64le",
"openSUSE Tumbleweed:afterburn-5.0.0-6.1.s390x",
"openSUSE Tumbleweed:afterburn-5.0.0-6.1.x86_64",
"openSUSE Tumbleweed:afterburn-dracut-5.0.0-6.1.aarch64",
"openSUSE Tumbleweed:afterburn-dracut-5.0.0-6.1.ppc64le",
"openSUSE Tumbleweed:afterburn-dracut-5.0.0-6.1.s390x",
"openSUSE Tumbleweed:afterburn-dracut-5.0.0-6.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-35905",
"url": "https://www.suse.com/security/cve/CVE-2020-35905"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:afterburn-5.0.0-6.1.aarch64",
"openSUSE Tumbleweed:afterburn-5.0.0-6.1.ppc64le",
"openSUSE Tumbleweed:afterburn-5.0.0-6.1.s390x",
"openSUSE Tumbleweed:afterburn-5.0.0-6.1.x86_64",
"openSUSE Tumbleweed:afterburn-dracut-5.0.0-6.1.aarch64",
"openSUSE Tumbleweed:afterburn-dracut-5.0.0-6.1.ppc64le",
"openSUSE Tumbleweed:afterburn-dracut-5.0.0-6.1.s390x",
"openSUSE Tumbleweed:afterburn-dracut-5.0.0-6.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:afterburn-5.0.0-6.1.aarch64",
"openSUSE Tumbleweed:afterburn-5.0.0-6.1.ppc64le",
"openSUSE Tumbleweed:afterburn-5.0.0-6.1.s390x",
"openSUSE Tumbleweed:afterburn-5.0.0-6.1.x86_64",
"openSUSE Tumbleweed:afterburn-dracut-5.0.0-6.1.aarch64",
"openSUSE Tumbleweed:afterburn-dracut-5.0.0-6.1.ppc64le",
"openSUSE Tumbleweed:afterburn-dracut-5.0.0-6.1.s390x",
"openSUSE Tumbleweed:afterburn-dracut-5.0.0-6.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2020-35905"
},
{
"cve": "CVE-2020-36465",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-36465"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the generic-array crate before 0.13.3 for Rust. It violates soundness by using the arr! macro to extend lifetimes.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:afterburn-5.0.0-6.1.aarch64",
"openSUSE Tumbleweed:afterburn-5.0.0-6.1.ppc64le",
"openSUSE Tumbleweed:afterburn-5.0.0-6.1.s390x",
"openSUSE Tumbleweed:afterburn-5.0.0-6.1.x86_64",
"openSUSE Tumbleweed:afterburn-dracut-5.0.0-6.1.aarch64",
"openSUSE Tumbleweed:afterburn-dracut-5.0.0-6.1.ppc64le",
"openSUSE Tumbleweed:afterburn-dracut-5.0.0-6.1.s390x",
"openSUSE Tumbleweed:afterburn-dracut-5.0.0-6.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-36465",
"url": "https://www.suse.com/security/cve/CVE-2020-36465"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:afterburn-5.0.0-6.1.aarch64",
"openSUSE Tumbleweed:afterburn-5.0.0-6.1.ppc64le",
"openSUSE Tumbleweed:afterburn-5.0.0-6.1.s390x",
"openSUSE Tumbleweed:afterburn-5.0.0-6.1.x86_64",
"openSUSE Tumbleweed:afterburn-dracut-5.0.0-6.1.aarch64",
"openSUSE Tumbleweed:afterburn-dracut-5.0.0-6.1.ppc64le",
"openSUSE Tumbleweed:afterburn-dracut-5.0.0-6.1.s390x",
"openSUSE Tumbleweed:afterburn-dracut-5.0.0-6.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2020-36465"
},
{
"cve": "CVE-2021-27378",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-27378"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the rand_core crate before 0.6.2 for Rust. Because read_u32_into and read_u64_into mishandle certain buffer-length checks, a random number generator may be seeded with too little data.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:afterburn-5.0.0-6.1.aarch64",
"openSUSE Tumbleweed:afterburn-5.0.0-6.1.ppc64le",
"openSUSE Tumbleweed:afterburn-5.0.0-6.1.s390x",
"openSUSE Tumbleweed:afterburn-5.0.0-6.1.x86_64",
"openSUSE Tumbleweed:afterburn-dracut-5.0.0-6.1.aarch64",
"openSUSE Tumbleweed:afterburn-dracut-5.0.0-6.1.ppc64le",
"openSUSE Tumbleweed:afterburn-dracut-5.0.0-6.1.s390x",
"openSUSE Tumbleweed:afterburn-dracut-5.0.0-6.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-27378",
"url": "https://www.suse.com/security/cve/CVE-2021-27378"
},
{
"category": "external",
"summary": "SUSE Bug 1182432 for CVE-2021-27378",
"url": "https://bugzilla.suse.com/1182432"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:afterburn-5.0.0-6.1.aarch64",
"openSUSE Tumbleweed:afterburn-5.0.0-6.1.ppc64le",
"openSUSE Tumbleweed:afterburn-5.0.0-6.1.s390x",
"openSUSE Tumbleweed:afterburn-5.0.0-6.1.x86_64",
"openSUSE Tumbleweed:afterburn-dracut-5.0.0-6.1.aarch64",
"openSUSE Tumbleweed:afterburn-dracut-5.0.0-6.1.ppc64le",
"openSUSE Tumbleweed:afterburn-dracut-5.0.0-6.1.s390x",
"openSUSE Tumbleweed:afterburn-dracut-5.0.0-6.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:afterburn-5.0.0-6.1.aarch64",
"openSUSE Tumbleweed:afterburn-5.0.0-6.1.ppc64le",
"openSUSE Tumbleweed:afterburn-5.0.0-6.1.s390x",
"openSUSE Tumbleweed:afterburn-5.0.0-6.1.x86_64",
"openSUSE Tumbleweed:afterburn-dracut-5.0.0-6.1.aarch64",
"openSUSE Tumbleweed:afterburn-dracut-5.0.0-6.1.ppc64le",
"openSUSE Tumbleweed:afterburn-dracut-5.0.0-6.1.s390x",
"openSUSE Tumbleweed:afterburn-dracut-5.0.0-6.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2021-27378"
},
{
"cve": "CVE-2021-32714",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-32714"
}
],
"notes": [
{
"category": "general",
"text": "hyper is an HTTP library for Rust. In versions prior to 0.14.10, hyper\u0027s HTTP server and client code had a flaw that could trigger an integer overflow when decoding chunk sizes that are too big. This allows possible data loss, or if combined with an upstream HTTP proxy that allows chunk sizes larger than hyper does, can result in \"request smuggling\" or \"desync attacks.\" The vulnerability is patched in version 0.14.10. Two possible workarounds exist. One may reject requests manually that contain a `Transfer-Encoding` header or ensure any upstream proxy rejects `Transfer-Encoding` chunk sizes greater than what fits in 64-bit unsigned integers.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:afterburn-5.0.0-6.1.aarch64",
"openSUSE Tumbleweed:afterburn-5.0.0-6.1.ppc64le",
"openSUSE Tumbleweed:afterburn-5.0.0-6.1.s390x",
"openSUSE Tumbleweed:afterburn-5.0.0-6.1.x86_64",
"openSUSE Tumbleweed:afterburn-dracut-5.0.0-6.1.aarch64",
"openSUSE Tumbleweed:afterburn-dracut-5.0.0-6.1.ppc64le",
"openSUSE Tumbleweed:afterburn-dracut-5.0.0-6.1.s390x",
"openSUSE Tumbleweed:afterburn-dracut-5.0.0-6.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-32714",
"url": "https://www.suse.com/security/cve/CVE-2021-32714"
},
{
"category": "external",
"summary": "SUSE Bug 1188174 for CVE-2021-32714",
"url": "https://bugzilla.suse.com/1188174"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:afterburn-5.0.0-6.1.aarch64",
"openSUSE Tumbleweed:afterburn-5.0.0-6.1.ppc64le",
"openSUSE Tumbleweed:afterburn-5.0.0-6.1.s390x",
"openSUSE Tumbleweed:afterburn-5.0.0-6.1.x86_64",
"openSUSE Tumbleweed:afterburn-dracut-5.0.0-6.1.aarch64",
"openSUSE Tumbleweed:afterburn-dracut-5.0.0-6.1.ppc64le",
"openSUSE Tumbleweed:afterburn-dracut-5.0.0-6.1.s390x",
"openSUSE Tumbleweed:afterburn-dracut-5.0.0-6.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:afterburn-5.0.0-6.1.aarch64",
"openSUSE Tumbleweed:afterburn-5.0.0-6.1.ppc64le",
"openSUSE Tumbleweed:afterburn-5.0.0-6.1.s390x",
"openSUSE Tumbleweed:afterburn-5.0.0-6.1.x86_64",
"openSUSE Tumbleweed:afterburn-dracut-5.0.0-6.1.aarch64",
"openSUSE Tumbleweed:afterburn-dracut-5.0.0-6.1.ppc64le",
"openSUSE Tumbleweed:afterburn-dracut-5.0.0-6.1.s390x",
"openSUSE Tumbleweed:afterburn-dracut-5.0.0-6.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-32714"
},
{
"cve": "CVE-2021-32715",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-32715"
}
],
"notes": [
{
"category": "general",
"text": "hyper is an HTTP library for rust. hyper\u0027s HTTP/1 server code had a flaw that incorrectly parses and accepts requests with a `Content-Length` header with a prefixed plus sign, when it should have been rejected as illegal. This combined with an upstream HTTP proxy that doesn\u0027t parse such `Content-Length` headers, but forwards them, can result in \"request smuggling\" or \"desync attacks\". The flaw exists in all prior versions of hyper prior to 0.14.10, if built with `rustc` v1.5.0 or newer. The vulnerability is patched in hyper version 0.14.10. Two workarounds exist: One may reject requests manually that contain a plus sign prefix in the `Content-Length` header or ensure any upstream proxy handles `Content-Length` headers with a plus sign prefix.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:afterburn-5.0.0-6.1.aarch64",
"openSUSE Tumbleweed:afterburn-5.0.0-6.1.ppc64le",
"openSUSE Tumbleweed:afterburn-5.0.0-6.1.s390x",
"openSUSE Tumbleweed:afterburn-5.0.0-6.1.x86_64",
"openSUSE Tumbleweed:afterburn-dracut-5.0.0-6.1.aarch64",
"openSUSE Tumbleweed:afterburn-dracut-5.0.0-6.1.ppc64le",
"openSUSE Tumbleweed:afterburn-dracut-5.0.0-6.1.s390x",
"openSUSE Tumbleweed:afterburn-dracut-5.0.0-6.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-32715",
"url": "https://www.suse.com/security/cve/CVE-2021-32715"
},
{
"category": "external",
"summary": "SUSE Bug 1188173 for CVE-2021-32715",
"url": "https://bugzilla.suse.com/1188173"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:afterburn-5.0.0-6.1.aarch64",
"openSUSE Tumbleweed:afterburn-5.0.0-6.1.ppc64le",
"openSUSE Tumbleweed:afterburn-5.0.0-6.1.s390x",
"openSUSE Tumbleweed:afterburn-5.0.0-6.1.x86_64",
"openSUSE Tumbleweed:afterburn-dracut-5.0.0-6.1.aarch64",
"openSUSE Tumbleweed:afterburn-dracut-5.0.0-6.1.ppc64le",
"openSUSE Tumbleweed:afterburn-dracut-5.0.0-6.1.s390x",
"openSUSE Tumbleweed:afterburn-dracut-5.0.0-6.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.1,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:afterburn-5.0.0-6.1.aarch64",
"openSUSE Tumbleweed:afterburn-5.0.0-6.1.ppc64le",
"openSUSE Tumbleweed:afterburn-5.0.0-6.1.s390x",
"openSUSE Tumbleweed:afterburn-5.0.0-6.1.x86_64",
"openSUSE Tumbleweed:afterburn-dracut-5.0.0-6.1.aarch64",
"openSUSE Tumbleweed:afterburn-dracut-5.0.0-6.1.ppc64le",
"openSUSE Tumbleweed:afterburn-dracut-5.0.0-6.1.s390x",
"openSUSE Tumbleweed:afterburn-dracut-5.0.0-6.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2021-32715"
},
{
"cve": "CVE-2021-38191",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-38191"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the tokio crate before 1.8.1 for Rust. Upon a JoinHandle::abort, a Task may be dropped in the wrong thread.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:afterburn-5.0.0-6.1.aarch64",
"openSUSE Tumbleweed:afterburn-5.0.0-6.1.ppc64le",
"openSUSE Tumbleweed:afterburn-5.0.0-6.1.s390x",
"openSUSE Tumbleweed:afterburn-5.0.0-6.1.x86_64",
"openSUSE Tumbleweed:afterburn-dracut-5.0.0-6.1.aarch64",
"openSUSE Tumbleweed:afterburn-dracut-5.0.0-6.1.ppc64le",
"openSUSE Tumbleweed:afterburn-dracut-5.0.0-6.1.s390x",
"openSUSE Tumbleweed:afterburn-dracut-5.0.0-6.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-38191",
"url": "https://www.suse.com/security/cve/CVE-2021-38191"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:afterburn-5.0.0-6.1.aarch64",
"openSUSE Tumbleweed:afterburn-5.0.0-6.1.ppc64le",
"openSUSE Tumbleweed:afterburn-5.0.0-6.1.s390x",
"openSUSE Tumbleweed:afterburn-5.0.0-6.1.x86_64",
"openSUSE Tumbleweed:afterburn-dracut-5.0.0-6.1.aarch64",
"openSUSE Tumbleweed:afterburn-dracut-5.0.0-6.1.ppc64le",
"openSUSE Tumbleweed:afterburn-dracut-5.0.0-6.1.s390x",
"openSUSE Tumbleweed:afterburn-dracut-5.0.0-6.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2021-38191"
},
{
"cve": "CVE-2021-45710",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-45710"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the tokio crate before 1.8.4, and 1.9.x through 1.13.x before 1.13.1, for Rust. In certain circumstances involving a closed oneshot channel, there is a data race and memory corruption.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:afterburn-5.0.0-6.1.aarch64",
"openSUSE Tumbleweed:afterburn-5.0.0-6.1.ppc64le",
"openSUSE Tumbleweed:afterburn-5.0.0-6.1.s390x",
"openSUSE Tumbleweed:afterburn-5.0.0-6.1.x86_64",
"openSUSE Tumbleweed:afterburn-dracut-5.0.0-6.1.aarch64",
"openSUSE Tumbleweed:afterburn-dracut-5.0.0-6.1.ppc64le",
"openSUSE Tumbleweed:afterburn-dracut-5.0.0-6.1.s390x",
"openSUSE Tumbleweed:afterburn-dracut-5.0.0-6.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-45710",
"url": "https://www.suse.com/security/cve/CVE-2021-45710"
},
{
"category": "external",
"summary": "SUSE Bug 1194119 for CVE-2021-45710",
"url": "https://bugzilla.suse.com/1194119"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:afterburn-5.0.0-6.1.aarch64",
"openSUSE Tumbleweed:afterburn-5.0.0-6.1.ppc64le",
"openSUSE Tumbleweed:afterburn-5.0.0-6.1.s390x",
"openSUSE Tumbleweed:afterburn-5.0.0-6.1.x86_64",
"openSUSE Tumbleweed:afterburn-dracut-5.0.0-6.1.aarch64",
"openSUSE Tumbleweed:afterburn-dracut-5.0.0-6.1.ppc64le",
"openSUSE Tumbleweed:afterburn-dracut-5.0.0-6.1.s390x",
"openSUSE Tumbleweed:afterburn-dracut-5.0.0-6.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:afterburn-5.0.0-6.1.aarch64",
"openSUSE Tumbleweed:afterburn-5.0.0-6.1.ppc64le",
"openSUSE Tumbleweed:afterburn-5.0.0-6.1.s390x",
"openSUSE Tumbleweed:afterburn-5.0.0-6.1.x86_64",
"openSUSE Tumbleweed:afterburn-dracut-5.0.0-6.1.aarch64",
"openSUSE Tumbleweed:afterburn-dracut-5.0.0-6.1.ppc64le",
"openSUSE Tumbleweed:afterburn-dracut-5.0.0-6.1.s390x",
"openSUSE Tumbleweed:afterburn-dracut-5.0.0-6.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2021-45710"
}
]
}
GHSA-2GRH-HM3W-W7HV
Vulnerability from github – Published: 2021-08-25 20:55 – Updated: 2023-06-13 22:08When aborting a task with JoinHandle::abort, the future is dropped in the thread calling abort if the task is not currently being executed. This is incorrect for tasks spawned on a LocalSet. This can easily result in race conditions as many projects use Rc or RefCell in their Tokio tasks for better performance.
{
"affected": [
{
"package": {
"ecosystem": "crates.io",
"name": "tokio"
},
"ranges": [
{
"events": [
{
"introduced": "1.8.0"
},
{
"fixed": "1.8.1"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "crates.io",
"name": "tokio"
},
"ranges": [
{
"events": [
{
"introduced": "1.7.0"
},
{
"fixed": "1.7.2"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "crates.io",
"name": "tokio"
},
"ranges": [
{
"events": [
{
"introduced": "1.6.0"
},
{
"fixed": "1.6.3"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "crates.io",
"name": "tokio"
},
"ranges": [
{
"events": [
{
"introduced": "0.3.0"
},
{
"fixed": "1.5.1"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"aliases": [
"CVE-2021-38191"
],
"database_specific": {
"cwe_ids": [
"CWE-362",
"CWE-366"
],
"github_reviewed": true,
"github_reviewed_at": "2021-08-18T21:30:23Z",
"nvd_published_at": "2021-08-08T06:15:00Z",
"severity": "MODERATE"
},
"details": "When aborting a task with JoinHandle::abort, the future is dropped in the thread calling abort if the task is not currently being executed. This is incorrect for tasks spawned on a LocalSet. This can easily result in race conditions as many projects use Rc or RefCell in their Tokio tasks for better performance.",
"id": "GHSA-2grh-hm3w-w7hv",
"modified": "2023-06-13T22:08:56Z",
"published": "2021-08-25T20:55:51Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-38191"
},
{
"type": "WEB",
"url": "https://github.com/tokio-rs/tokio/issues/3929"
},
{
"type": "PACKAGE",
"url": "https://github.com/tokio-rs/tokio"
},
{
"type": "WEB",
"url": "https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/tokio/RUSTSEC-2021-0072.md"
},
{
"type": "WEB",
"url": "https://rustsec.org/advisories/RUSTSEC-2021-0072.html"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
],
"summary": "Race condition in tokio"
}
MSRC_CVE-2021-38191
Vulnerability from csaf_microsoft - Published: 2021-08-02 00:00 - Updated: 2026-02-18 03:11| URL | Category | |
|---|---|---|
{
"document": {
"category": "csaf_vex",
"csaf_version": "2.0",
"distribution": {
"text": "Public",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en-US",
"notes": [
{
"category": "general",
"text": "To determine the support lifecycle for your software, see the Microsoft Support Lifecycle: https://support.microsoft.com/lifecycle",
"title": "Additional Resources"
},
{
"category": "legal_disclaimer",
"text": "The information provided in the Microsoft Knowledge Base is provided \\\"as is\\\" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.",
"title": "Disclaimer"
}
],
"publisher": {
"category": "vendor",
"contact_details": "secure@microsoft.com",
"name": "Microsoft Security Response Center",
"namespace": "https://msrc.microsoft.com"
},
"references": [
{
"category": "self",
"summary": "CVE-2021-38191 An issue was discovered in the tokio crate before 1.8.1 for Rust. Upon a JoinHandle::abort, a Task may be dropped in the wrong thread. - VEX",
"url": "https://msrc.microsoft.com/csaf/vex/2021/msrc_cve-2021-38191.json"
},
{
"category": "external",
"summary": "Microsoft Support Lifecycle",
"url": "https://support.microsoft.com/lifecycle"
},
{
"category": "external",
"summary": "Common Vulnerability Scoring System",
"url": "https://www.first.org/cvss"
}
],
"title": "An issue was discovered in the tokio crate before 1.8.1 for Rust. Upon a JoinHandle::abort, a Task may be dropped in the wrong thread.",
"tracking": {
"current_release_date": "2026-02-18T03:11:54.000Z",
"generator": {
"date": "2026-02-18T10:58:48.084Z",
"engine": {
"name": "MSRC Generator",
"version": "1.0"
}
},
"id": "msrc_CVE-2021-38191",
"initial_release_date": "2021-08-02T00:00:00.000Z",
"revision_history": [
{
"date": "2025-09-04T05:12:49.000Z",
"legacy_version": "1",
"number": "1",
"summary": "Information published."
},
{
"date": "2026-02-18T03:11:54.000Z",
"legacy_version": "1.1",
"number": "2",
"summary": "Information published."
}
],
"status": "final",
"version": "2"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "3.0",
"product": {
"name": "Azure Linux 3.0",
"product_id": "17084"
}
}
],
"category": "product_name",
"name": "Azure Linux"
},
{
"category": "product_name",
"name": "azl3 mozjs 102.15.1-1",
"product": {
"name": "azl3 mozjs 102.15.1-1",
"product_id": "1"
}
}
],
"category": "vendor",
"name": "Microsoft"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "azl3 mozjs 102.15.1-1 as a component of Azure Linux 3.0",
"product_id": "17084-1"
},
"product_reference": "1",
"relates_to_product_reference": "17084"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-38191",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0026#39;Race Condition\u0026#39;)"
},
"flags": [
{
"label": "component_not_present",
"product_ids": [
"17084-1"
]
}
],
"notes": [
{
"category": "general",
"text": "mitre",
"title": "Assigning CNA"
}
],
"product_status": {
"known_not_affected": [
"17084-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2021-38191 An issue was discovered in the tokio crate before 1.8.1 for Rust. Upon a JoinHandle::abort, a Task may be dropped in the wrong thread. - VEX",
"url": "https://msrc.microsoft.com/csaf/vex/2021/msrc_cve-2021-38191.json"
}
],
"title": "An issue was discovered in the tokio crate before 1.8.1 for Rust. Upon a JoinHandle::abort, a Task may be dropped in the wrong thread."
}
]
}
FKIE_CVE-2021-38191
Vulnerability from fkie_nvd - Published: 2021-08-08 06:15 - Updated: 2024-11-21 06:16| URL | Tags | ||
|---|---|---|---|
| cve@mitre.org | https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/tokio/RUSTSEC-2021-0072.md | Third Party Advisory | |
| cve@mitre.org | https://rustsec.org/advisories/RUSTSEC-2021-0072.html | Exploit, Issue Tracking, Patch, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/tokio/RUSTSEC-2021-0072.md | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://rustsec.org/advisories/RUSTSEC-2021-0072.html | Exploit, Issue Tracking, Patch, Third Party Advisory |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:tokio:tokio:*:*:*:*:*:rust:*:*",
"matchCriteriaId": "B505EDA7-2107-4169-8D1E-CD2AAA038674",
"versionEndExcluding": "1.5.1",
"versionStartIncluding": "0.3.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tokio:tokio:*:*:*:*:*:rust:*:*",
"matchCriteriaId": "033FFED8-23B5-451F-847E-475D961C6832",
"versionEndExcluding": "1.6.3",
"versionStartIncluding": "1.6.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tokio:tokio:*:*:*:*:*:rust:*:*",
"matchCriteriaId": "FA62E77D-CAF1-40CF-B472-13CBCA974C07",
"versionEndExcluding": "1.7.2",
"versionStartIncluding": "1.7.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tokio:tokio:1.8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "BE706735-E1D9-46AB-AAFD-C7DEFC58AD5D",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in the tokio crate before 1.8.1 for Rust. Upon a JoinHandle::abort, a Task may be dropped in the wrong thread."
},
{
"lang": "es",
"value": "Se ha detectado un problema en la crate tokio versiones anteriores a 1.8.1 para Rust. Tras una funci\u00f3n JoinHandle::abort, una Tarea puede ser lanzada en el hilo equivocado"
}
],
"id": "CVE-2021-38191",
"lastModified": "2024-11-21T06:16:36.630",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.2,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2021-08-08T06:15:08.967",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/tokio/RUSTSEC-2021-0072.md"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://rustsec.org/advisories/RUSTSEC-2021-0072.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/tokio/RUSTSEC-2021-0072.md"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://rustsec.org/advisories/RUSTSEC-2021-0072.html"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-362"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
rustsec-2021-0072
Vulnerability from osv_rustsec
When aborting a task with JoinHandle::abort, the future is dropped in the
thread calling abort if the task is not currently being executed. This is
incorrect for tasks spawned on a LocalSet.
This can easily result in race conditions as many projects use Rc or RefCell
in their Tokio tasks for better performance.
See tokio#3929 for more details.
| URL | Type | |
|---|---|---|
{
"affected": [
{
"database_specific": {
"categories": [
"memory-corruption"
],
"cvss": null,
"informational": null
},
"ecosystem_specific": {
"affected_functions": null,
"affects": {
"arch": [],
"functions": [
"tokio::task::JoinHandle::abort"
],
"os": []
}
},
"package": {
"ecosystem": "crates.io",
"name": "tokio",
"purl": "pkg:cargo/tokio"
},
"ranges": [
{
"events": [
{
"introduced": "0.3.0"
},
{
"fixed": "1.5.1"
},
{
"introduced": "1.6.0"
},
{
"fixed": "1.6.3"
},
{
"introduced": "1.7.0"
},
{
"fixed": "1.7.2"
},
{
"introduced": "1.8.0"
},
{
"fixed": "1.8.1"
}
],
"type": "SEMVER"
}
],
"versions": []
}
],
"aliases": [
"CVE-2021-38191",
"GHSA-2grh-hm3w-w7hv"
],
"database_specific": {
"license": "CC0-1.0"
},
"details": "When aborting a task with `JoinHandle::abort`, the future is dropped in the\nthread calling abort if the task is not currently being executed. This is\nincorrect for tasks spawned on a `LocalSet`.\n\nThis can easily result in race conditions as many projects use `Rc` or `RefCell`\nin their Tokio tasks for better performance.\n\nSee [tokio#3929][issue] for more details.\n\n[issue]: https://github.com/tokio-rs/tokio/issues/3929",
"id": "RUSTSEC-2021-0072",
"modified": "2023-06-13T13:10:24Z",
"published": "2021-07-07T12:00:00Z",
"references": [
{
"type": "PACKAGE",
"url": "https://crates.io/crates/tokio"
},
{
"type": "ADVISORY",
"url": "https://rustsec.org/advisories/RUSTSEC-2021-0072.html"
},
{
"type": "REPORT",
"url": "https://github.com/tokio-rs/tokio/issues/3929"
}
],
"related": [],
"severity": [],
"summary": "Task dropped in wrong thread when aborting `LocalSet` task"
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.