MGASA-2025-0136

Source
https://advisories.mageia.org/MGASA-2025-0136.html
Import Source
https://advisories.mageia.org/MGASA-2025-0136.json
JSON Data
https://api.test.osv.dev/v1/vulns/MGASA-2025-0136
Related
Published
2025-04-17T17:37:29Z
Modified
2025-04-17T17:02:46Z
Summary
Updated rust packages fix security vulnerability
Details

The Rust Security Response WG was notified that the Rust standard library did not properly escape arguments when invoking batch files (with the bat and cmd extensions) on Windows using the Command API. An attacker able to control the arguments passed to the spawned process could execute arbitrary shell commands by bypassing the escaping. The severity of this vulnerability is critical if you are invoking batch files on Windows with untrusted arguments. No other platform or use is affected. We update to rust 1.78.0 for future mesa updates in mageia 9.

References
Credits

Affected packages

Mageia:9 / rust

Package

Name
rust
Purl
pkg:rpm/mageia/rust?distro=mageia-9

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.78.0-1.mga9

Ecosystem specific

{
    "section": "core"
}