VYPR

apk package

wolfi/zellij-fish-completion

pkg:apk/wolfi/zellij-fish-completion

Vulnerabilities (8)

  • CVE-2024-12224May 30, 2025
    affected < 0.41.2-r2fixed 0.41.2-r2

    Improper Validation of Unsafe Equivalence in punycode by the idna crate from Servo rust-url allows an attacker to create a punycode hostname that one part of a system might treat as distinct while another part of that system would treat as equivalent to another hostname.

  • CVE-2024-51756LowNov 5, 2024
    affected < 0.41.2-r1fixed 0.41.2-r1

    The cap-std project is organized around the eponymous `cap-std` crate, and develops libraries to make it easy to write capability-based code. cap-std's filesystem sandbox implementation on Windows blocks access to special device filenames such as "COM1", "COM2", "LPT0", "LPT1", a

  • CVE-2024-51745Nov 5, 2024
    affected < 0fixed 0

    Wasmtime is a fast and secure runtime for WebAssembly. Wasmtime's filesystem sandbox implementation on Windows blocks access to special device filenames such as "COM1", "COM2", "LPT0", "LPT1", and so on, however it did not block access to the special device filenames which use su

  • CVE-2024-43806MedAug 26, 2024
    affected < 0.42.1-r0fixed 0.42.1-r0

    Rustix is a set of safe Rust bindings to POSIX-ish APIs. When using `rustix::fs::Dir` using the `linux_raw` backend, it's possible for the iterator to "get stuck" when an IO error is encountered. Combined with a memory over-allocation issue in `rustix::fs::Dir::read_more`, this c

  • CVE-2024-38358LowJun 19, 2024
    affected < 0.41.2-r0fixed 0.41.2-r0

    Wasmer is a web assembly (wasm) Runtime supporting WASIX, WASI and Emscripten. If the preopened directory has a symlink pointing outside, WASI programs can traverse the symlink and access host filesystem if the caller sets both `oflags::creat` and `rights::fd_write`. Programs can

  • CVE-2024-27308Mar 6, 2024
    affected < 0.41.2-r2fixed 0.41.2-r2

    Mio is a Metal I/O library for Rust. When using named pipes on Windows, mio will under some circumstances return invalid tokens that correspond to named pipes that have already been deregistered from the mio registry. The impact of this vulnerability depends on how mio is used. F

  • CVE-2023-26489Mar 8, 2023
    affected < 0.41.2-r0fixed 0.41.2-r0

    wasmtime is a fast and secure runtime for WebAssembly. In affected versions wasmtime's code generator, Cranelift, has a bug on x86_64 targets where address-mode computation mistakenly would calculate a 35-bit effective address instead of WebAssembly's defined 33-bit effective add

  • CVE-2020-26235Nov 24, 2020
    affected < 0.41.2-r2fixed 0.41.2-r2

    In Rust time crate from version 0.2.7 and before version 0.2.23, unix-like operating systems may segfault due to dereferencing a dangling pointer in specific circumstances. This requires the user to set any environment variable in a different thread than the affected functions. T