VYPR

rpm package

opensuse/rust-keylime&distro=openSUSE Tumbleweed

pkg:rpm/opensuse/rust-keylime&distro=openSUSE%20Tumbleweed

Vulnerabilities (6)

  • CVE-2026-25727Feb 6, 2026
    affected < 0.2.8+116-1.1fixed 0.2.8+116-1.1

    time provides date and time handling in Rust. From 0.3.6 to before 0.3.47, when user-provided input is provided to any type that parses with the RFC 2822 format, a denial of service attack via stack exhaustion is possible. The attack relies on formally deprecated and rarely-used

  • CVE-2025-58266MedSep 22, 2025
    affected < 0.2.7+141-1.1fixed 0.2.7+141-1.1

    Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Fumiki Takahashi Gianism gianism allows Stored XSS.This issue affects Gianism: from n/a through <= 6.0.0.

  • CVE-2025-55159MedAug 11, 2025
    affected < 0.2.8+12-1.1fixed 0.2.8+12-1.1

    slab is a pre-allocated storage for a uniform data type. In version 0.4.10, the get_disjoint_mut method incorrectly checked if indices were within the slab's capacity instead of its length, allowing access to uninitialized memory. This could lead to undefined behavior or potentia

  • CVE-2024-12224May 30, 2025
    affected < 0.2.7+70-2.1fixed 0.2.7+70-2.1

    Improper Validation of Unsafe Equivalence in punycode by the idna crate from Servo rust-url allows an attacker to create a punycode hostname that one part of a system might treat as distinct while another part of that system would treat as equivalent to another hostname.

  • CVE-2025-3416LowApr 8, 2025
    affected < 0.2.7+117-1.1fixed 0.2.7+117-1.1

    A flaw was found in OpenSSL's handling of the properties argument in certain functions. This vulnerability can allow use-after-free exploitation, which may result in undefined behavior or incorrect property parsing, leading to OpenSSL treating the input as an empty string.

  • CVE-2024-43806MedAug 26, 2024
    affected < 0.2.7+70-2.1fixed 0.2.7+70-2.1

    Rustix is a set of safe Rust bindings to POSIX-ish APIs. When using `rustix::fs::Dir` using the `linux_raw` backend, it's possible for the iterator to "get stuck" when an IO error is encountered. Combined with a memory over-allocation issue in `rustix::fs::Dir::read_more`, this c