VYPR

rpm package

suse/rust-keylime&distro=SUSE Linux Enterprise Micro 5.5

pkg:rpm/suse/rust-keylime&distro=SUSE%20Linux%20Enterprise%20Micro%205.5

Vulnerabilities (8)

  • CVE-2026-25727Feb 6, 2026
    affected < 0.2.8+116-150500.3.11.1fixed 0.2.8+116-150500.3.11.1

    time provides date and time handling in Rust. From 0.3.6 to before 0.3.47, when user-provided input is provided to any type that parses with the RFC 2822 format, a denial of service attack via stack exhaustion is possible. The attack relies on formally deprecated and rarely-used

  • CVE-2025-58266MedSep 22, 2025
    affected < 0.2.7+141-150500.3.5.1fixed 0.2.7+141-150500.3.5.1

    Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Fumiki Takahashi Gianism gianism allows Stored XSS.This issue affects Gianism: from n/a through <= 6.0.0.

  • CVE-2025-55159MedAug 11, 2025
    affected < 0.2.8+12-150500.3.8.1fixed 0.2.8+12-150500.3.8.1

    slab is a pre-allocated storage for a uniform data type. In version 0.4.10, the get_disjoint_mut method incorrectly checked if indices were within the slab's capacity instead of its length, allowing access to uninitialized memory. This could lead to undefined behavior or potentia

  • CVE-2024-12224May 30, 2025
    affected < 0.2.7+141-150500.3.5.1fixed 0.2.7+141-150500.3.5.1

    Improper Validation of Unsafe Equivalence in punycode by the idna crate from Servo rust-url allows an attacker to create a punycode hostname that one part of a system might treat as distinct while another part of that system would treat as equivalent to another hostname.

  • CVE-2025-3416LowApr 8, 2025
    affected < 0.2.7+141-150500.3.5.1fixed 0.2.7+141-150500.3.5.1

    A flaw was found in OpenSSL's handling of the properties argument in certain functions. This vulnerability can allow use-after-free exploitation, which may result in undefined behavior or incorrect property parsing, leading to OpenSSL treating the input as an empty string.

  • CVE-2024-43806MedAug 26, 2024
    affected < 0.2.7+141-150500.3.5.1fixed 0.2.7+141-150500.3.5.1

    Rustix is a set of safe Rust bindings to POSIX-ish APIs. When using `rustix::fs::Dir` using the `linux_raw` backend, it's possible for the iterator to "get stuck" when an IO error is encountered. Combined with a memory over-allocation issue in `rustix::fs::Dir::read_more`, this c

  • CVE-2024-32650HigApr 19, 2024
    affected < 0.2.7+141-150500.3.5.1fixed 0.2.7+141-150500.3.5.1

    Rustls is a modern TLS library written in Rust. `rustls::ConnectionCommon::complete_io` could fall into an infinite loop based on network input. When using a blocking rustls server, if a client send a `close_notify` message immediately after `client_hello`, the server's `complete

  • CVE-2023-26964Apr 11, 2023
    affected < 0.2.7+141-150500.3.5.1fixed 0.2.7+141-150500.3.5.1

    An issue was discovered in hyper v0.13.7. h2-0.2.4 Stream stacking occurs when the H2 component processes HTTP2 RST_STREAM frames. As a result, the memory and CPU usage are high which can lead to a Denial of Service (DoS).