RUSTSEC-2025-0040

Source
https://rustsec.org/advisories/RUSTSEC-2025-0040
Import Source
https://github.com/rustsec/advisory-db/blob/osv/crates/RUSTSEC-2025-0040.json
JSON Data
https://api.osv.dev/v1/vulns/RUSTSEC-2025-0040
Aliases
Published
2025-01-15T12:00:00Z
Modified
2025-10-28T06:28:57.282109Z
Summary
`root` appended to group listings
Details

Affected versions append root to group listings, unless the correct listing has exactly 1024 groups.

This affects both:

  • The supplementary groups of a user
  • The group access list of the current process

If the caller uses this information for access control, this may lead to privilege escalation.

This crate is not currently maintained, so a patched version is not available.

Versions older than 0.8.0 do not contain the affected functions, so downgrading to them is a workaround.

Recommended alternatives

  • uzers (an actively maintained fork of the users crate)
  • sysinfo
Database specific
{
    "license": "CC0-1.0"
}
References

Affected packages

crates.io / users

Package

Affected ranges

Type
SEMVER
Events
Introduced
0.8.0

Ecosystem specific

{
    "affected_functions": null,
    "affects": {
        "functions": [],
        "arch": [],
        "os": []
    }
}

Database specific

source
"https://github.com/rustsec/advisory-db/blob/osv/crates/RUSTSEC-2025-0040.json"
informational
null
categories
[
    "privilege-escalation"
]
cvss
null