A flaw was found in the user's crate for Rust. This vulnerability allows privilege escalation via incorrect group listing when a user or process has fewer than exactly 1024 groups, leading to the erroneous inclusion of the root group in the access list.
Metrics
Affected Vendors & Products
References
History
Sat, 07 Jun 2025 03:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
| |
Metrics |
threat_severity
|
threat_severity
|
Fri, 06 Jun 2025 14:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Fri, 06 Jun 2025 13:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A flaw was found in the user's crate for Rust. This vulnerability allows privilege escalation via incorrect group listing when a user or process has fewer than exactly 1024 groups, leading to the erroneous inclusion of the root group in the access list. | |
Title | Users: `root` appended to group listings | |
First Time appeared |
Redhat
Redhat enterprise Linux Redhat openshift Redhat trusted Profile Analyzer |
|
Weaknesses | CWE-266 | |
CPEs | cpe:/a:redhat:openshift:4 cpe:/a:redhat:trusted_profile_analyzer:1 cpe:/o:redhat:enterprise_linux:10 cpe:/o:redhat:enterprise_linux:9 |
|
Vendors & Products |
Redhat
Redhat enterprise Linux Redhat openshift Redhat trusted Profile Analyzer |
|
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: redhat
Published: 2025-06-06T13:10:07.157Z
Updated: 2025-06-09T18:35:18.605Z
Reserved: 2025-06-06T08:09:10.242Z
Link: CVE-2025-5791

Updated: 2025-06-06T13:40:44.958Z

Status : Awaiting Analysis
Published: 2025-06-06T14:15:23.137
Modified: 2025-06-09T12:15:47.880
Link: CVE-2025-5791
