<div class="container">
<h1>Security update for rust, rust1.72</h1>
<table class="table table-striped table-bordered">
<tbody>
<tr>
<th>Announcement ID:</th>
<td>SUSE-SU-2023:3722-1</td>
</tr>
<tr>
<th>Rating:</th>
<td>moderate</td>
</tr>
<tr>
<th>References:</th>
<td>
<ul>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1214689">#1214689</a>
</li>
</ul>
</td>
</tr>
<tr>
<th>
Cross-References:
</th>
<td>
<ul>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-40030.html">CVE-2023-40030</a>
</li>
</ul>
</td>
</tr>
<tr>
<th>CVSS scores:</th>
<td>
<ul class="list-group">
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-40030</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">6.1</span>
<span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-40030</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">6.1</span>
<span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N</span>
</li>
</ul>
</td>
</tr>
<tr>
<th>Affected Products:</th>
<td>
<ul class="list-group">
<li class="list-group-item">Development Tools Module 15-SP4</li>
<li class="list-group-item">Development Tools Module 15-SP5</li>
<li class="list-group-item">openSUSE Leap 15.4</li>
<li class="list-group-item">openSUSE Leap 15.5</li>
<li class="list-group-item">SUSE Linux Enterprise Desktop 15 SP4</li>
<li class="list-group-item">SUSE Linux Enterprise Desktop 15 SP5</li>
<li class="list-group-item">SUSE Linux Enterprise High Performance Computing 15 SP4</li>
<li class="list-group-item">SUSE Linux Enterprise High Performance Computing 15 SP5</li>
<li class="list-group-item">SUSE Linux Enterprise Real Time 15 SP4</li>
<li class="list-group-item">SUSE Linux Enterprise Real Time 15 SP5</li>
<li class="list-group-item">SUSE Linux Enterprise Server 15 SP4</li>
<li class="list-group-item">SUSE Linux Enterprise Server 15 SP5</li>
<li class="list-group-item">SUSE Linux Enterprise Server for SAP Applications 15 SP4</li>
<li class="list-group-item">SUSE Linux Enterprise Server for SAP Applications 15 SP5</li>
<li class="list-group-item">SUSE Manager Proxy 4.3</li>
<li class="list-group-item">SUSE Manager Retail Branch Server 4.3</li>
<li class="list-group-item">SUSE Manager Server 4.3</li>
</ul>
</td>
</tr>
</tbody>
</table>
<p>An update that solves one vulnerability can now be installed.</p>
<h2>Description:</h2>
<p>This update for rust, rust1.72 fixes the following issues:</p>
<p>Changes in rust:</p>
<ul>
<li>Update to version 1.72.0 - for details see the rust1.72 package</li>
</ul>
<p>Changes in rust1.72:</p>
<ul>
<li>CVE-2023-40030: fix minor non-exploited issue in cargo (bsc#1214689)</li>
</ul>
<h1>Version 1.72.0 (2023-08-24)</h1>
<h2>Language</h2>
<ul>
<li>Replace const eval limit by a lint and add an exponential backoff warning</li>
<li>expand: Change how <code>#![cfg(FALSE)]</code> behaves on crate root</li>
<li>Stabilize inline asm for LoongArch64</li>
<li>Uplift <code>clippy::undropped_manually_drops</code> lint</li>
<li>Uplift <code>clippy::invalid_utf8_in_unchecked</code> lint</li>
<li>Uplift <code>clippy::cast_ref_to_mut</code> lint</li>
<li>Uplift <code>clippy::cmp_nan</code> lint</li>
<li>resolve: Remove artificial import ambiguity errors</li>
<li>Don't require associated types with Self: Sized bounds in <code>dyn Trait</code> objects</li>
</ul>
<h2>Compiler</h2>
<ul>
<li>Remember names of <code>cfg</code>-ed out items to mention them in diagnostics</li>
<li>Support for native WASM exceptions</li>
<li>Add support for NetBSD/aarch64-be (big-endian arm64).</li>
<li>Write to stdout if <code>-</code> is given as output file</li>
<li>Force all native libraries to be statically linked when linking a static binary</li>
<li>Add Tier 3 support for <code>loongarch64-unknown-none*</code></li>
<li>Prevent <code>.eh_frame</code> from being emitted for <code>-C panic=abort</code></li>
<li>Support 128-bit enum variant in debuginfo codegen</li>
<li>compiler: update solaris/illumos to enable tsan support.</li>
</ul>
<p>Refer to Rust's platform support page for more information on Rust's tiered platform support.</p>
<h2>Libraries</h2>
<ul>
<li>Document memory orderings of <code>thread::{park, unpark}</code></li>
<li>io: soften ‘at most one write attempt’ requirement in io::Write::write</li>
<li>Specify behavior of HashSet::insert</li>
<li>Relax implicit <code>T: Sized</code> bounds on <code>BufReader<T></code>, <code>BufWriter<T></code> and <code>LineWriter<T></code></li>
<li>Update runtime guarantee for <code>select_nth_unstable</code></li>
<li>Return <code>Ok</code> on kill if process has already exited</li>
<li>Implement PartialOrd for <code>Vec</code>s over different allocators</li>
<li>Use 128 bits for TypeId hash</li>
<li>Don't drain-on-drop in DrainFilter impls of various collections.</li>
<li>Make <code>{Arc,Rc,Weak}::ptr_eq</code> ignore pointer metadata</li>
</ul>
<h2>Rustdoc</h2>
<ul>
<li>Allow whitespace as path separator like double colon</li>
<li>Add search result item types after their name</li>
<li>Search for slices and arrays by type with <code>[]</code></li>
<li>Clean up type unification and "unboxing"</li>
</ul>
<h2>Stabilized APIs</h2>
<ul>
<li><code>impl<T: Send> Sync for mpsc::Sender<T></code></li>
<li><code>impl TryFrom<&OsStr> for &str</code></li>
<li><code>String::leak</code></li>
</ul>
<p>These APIs are now stable in const contexts:</p>
<ul>
<li><code>CStr::from_bytes_with_nul</code></li>
<li><code>CStr::to_bytes</code></li>
<li><code>CStr::to_bytes_with_nul</code></li>
<li><code>CStr::to_str</code></li>
</ul>
<h2>Cargo</h2>
<ul>
<li>Enable <code>-Zdoctest-in-workspace</code> by default. When running each documentation
test, the working directory is set to the root directory of the package the
test belongs to.</li>
<li>Add support of the "default" keyword to reset previously set <code>build.jobs</code>
parallelism back to the default.</li>
</ul>
<h2>Compatibility Notes</h2>
<ul>
<li>Alter <code>Display</code> for <code>Ipv6Addr</code> for IPv4-compatible addresses</li>
<li>Cargo changed feature name validation check to a hard error. The warning was
added in Rust 1.49. These extended characters aren't allowed on crates.io, so
this should only impact users of other registries, or people who don't publish
to a registry.</li>
</ul>
<h2>Patch Instructions:</h2>
<p>
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper patch".<br/>
Alternatively you can run the command listed for your product:
</p>
<ul class="list-group">
<li class="list-group-item">
openSUSE Leap 15.4
<br/>
<code>zypper in -t patch SUSE-2023-3722=1 openSUSE-SLE-15.4-2023-3722=1</code>
</li>
<li class="list-group-item">
openSUSE Leap 15.5
<br/>
<code>zypper in -t patch openSUSE-SLE-15.5-2023-3722=1</code>
</li>
<li class="list-group-item">
Development Tools Module 15-SP4
<br/>
<code>zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP4-2023-3722=1</code>
</li>
<li class="list-group-item">
Development Tools Module 15-SP5
<br/>
<code>zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP5-2023-3722=1</code>
</li>
</ul>
<h2>Package List:</h2>
<ul>
<li>
openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586)
<ul>
<li>cargo1.72-1.72.0-150400.9.3.1</li>
<li>cargo1.72-debuginfo-1.72.0-150400.9.3.1</li>
<li>rust1.72-debuginfo-1.72.0-150400.9.3.1</li>
<li>cargo-1.72.0-150400.24.24.1</li>
<li>rust-1.72.0-150400.24.24.1</li>
</ul>
</li>
<li>
openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586 nosrc)
<ul>
<li>rust1.72-1.72.0-150400.9.3.1</li>
</ul>
</li>
<li>
openSUSE Leap 15.4 (nosrc)
<ul>
<li>rust1.72-test-1.72.0-150400.9.3.1</li>
</ul>
</li>
<li>
openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
<ul>
<li>cargo1.72-1.72.0-150400.9.3.1</li>
<li>cargo1.72-debuginfo-1.72.0-150400.9.3.1</li>
<li>rust1.72-debuginfo-1.72.0-150400.9.3.1</li>
<li>cargo-1.72.0-150400.24.24.1</li>
<li>rust-1.72.0-150400.24.24.1</li>
</ul>
</li>
<li>
openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 nosrc)
<ul>
<li>rust1.72-1.72.0-150400.9.3.1</li>
</ul>
</li>
<li>
Development Tools Module 15-SP4 (aarch64 ppc64le s390x x86_64)
<ul>
<li>cargo1.72-1.72.0-150400.9.3.1</li>
<li>cargo1.72-debuginfo-1.72.0-150400.9.3.1</li>
<li>rust1.72-debuginfo-1.72.0-150400.9.3.1</li>
<li>cargo-1.72.0-150400.24.24.1</li>
<li>rust-1.72.0-150400.24.24.1</li>
</ul>
</li>
<li>
Development Tools Module 15-SP4 (aarch64 ppc64le s390x x86_64 nosrc)
<ul>
<li>rust1.72-1.72.0-150400.9.3.1</li>
</ul>
</li>
<li>
Development Tools Module 15-SP5 (aarch64 ppc64le s390x x86_64)
<ul>
<li>cargo1.72-1.72.0-150400.9.3.1</li>
<li>cargo1.72-debuginfo-1.72.0-150400.9.3.1</li>
<li>rust1.72-debuginfo-1.72.0-150400.9.3.1</li>
<li>cargo-1.72.0-150400.24.24.1</li>
<li>rust-1.72.0-150400.24.24.1</li>
</ul>
</li>
<li>
Development Tools Module 15-SP5 (aarch64 ppc64le s390x x86_64 nosrc)
<ul>
<li>rust1.72-1.72.0-150400.9.3.1</li>
</ul>
</li>
</ul>
<h2>References:</h2>
<ul>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-40030.html">https://www.suse.com/security/cve/CVE-2023-40030.html</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1214689">https://bugzilla.suse.com/show_bug.cgi?id=1214689</a>
</li>
</ul>
</div>