File _patchinfo of Package patchinfo.30384
<patchinfo incident="30384">
<issue tracker="bnc" id="1196972">VUL-0: CVE-2022-24713: rust1.56,rust,rust1.55,rust1.59,rust1.54,rust1.57,rust1.43,rust1.53,rust1.58: regex crate is vulnerable;e to ReDoS</issue>
<issue tracker="bnc" id="1194119">VUL-1: CVE-2021-45710: rust1.55, rust1.53, rust1.56, rust, rust1.54, rust1.43: segmentation fault due to data race in tokio crate</issue>
<issue tracker="bnc" id="1212407">VUL-0: CVE-2023-1521: sccache: Local Privilege Escalation in sccache</issue>
<issue tracker="bnc" id="1208553">VUL-0: CVE-2022-31394: sccache: hyper: max header list size not settable allowing deny of service</issue>
<issue tracker="bnc" id="1181400">AUDIT-TASK: Evaluate systemd hardenings and get more services to use them</issue>
<issue tracker="cve" id="2021-45710"/>
<issue tracker="cve" id="2022-31394"/>
<issue tracker="cve" id="2022-24713"/>
<issue tracker="cve" id="2023-1521"/>
<packager>firstyear</packager>
<rating>important</rating>
<category>security</category>
<summary>Security update for sccache</summary>
<description>This update for sccache fixes the following issues:
- Update to version 0.4.2.
- CVE-2021-45710: Fixed a segmentation fault due to data race in tokio crate. (bsc#1194119)
- CVE-2022-24713: Fixed a ReDoS issue due to vulnerable regex crate. (bsc#1196972)
- CVE-2022-31394: Fixed a DoS issue due to the max header list size not settable. (bsc#1208553)
- CVE-2023-1521: Fixed a local privilege escalation. (bsc#1212407)
</description>
</patchinfo>