RUSTSEC-2023-0001

Source
https://rustsec.org/advisories/RUSTSEC-2023-0001
Import Source
https://github.com/rustsec/advisory-db/blob/osv/crates/RUSTSEC-2023-0001.json
JSON Data
https://api.osv.dev/v1/vulns/RUSTSEC-2023-0001
Aliases
Published
2023-01-04T12:00:00Z
Modified
2023-11-08T04:11:35.862060Z
Summary
reject_remote_clients Configuration corruption
Details

On Windows, configuring a named pipe server with [pipemode] will force [ServerOptions]::[rejectremote_clients] as false.

This drops any intended explicit configuration for the [rejectremoteclients] that may have been set as true previously.

The default setting of [rejectremoteclients] is normally true meaning the default is also overridden as false.

Workarounds

Ensure that [pipe_mode] is set first after initializing a [ServerOptions]. For example:

let mut opts = ServerOptions::new();
opts.pipe_mode(PipeMode::Message);
opts.reject_remote_clients(true);
Database specific
{
    "license": "CC0-1.0"
}
References

Affected packages

crates.io / tokio

Package

Affected ranges

Type
SEMVER
Events
Introduced
1.7.0
Fixed
1.18.4
Introduced
1.19.0
Fixed
1.20.3
Introduced
1.21.0
Fixed
1.23.1

Ecosystem specific

{
    "affected_functions": null,
    "affects": {
        "os": [
            "windows"
        ],
        "functions": [],
        "arch": []
    }
}

Database specific

{
    "cvss": null,
    "informational": null,
    "categories": []
}