Script 'mail_helper' called by obssrc Hello community, here is the log from the commit of package cargo-audit-advisory-db for openSUSE:Factory checked in at 2021-06-22 20:45:02 ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Comparing /work/SRC/openSUSE:Factory/cargo-audit-advisory-db (Old) and /work/SRC/openSUSE:Factory/.cargo-audit-advisory-db.new.2625 (New) ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Package is "cargo-audit-advisory-db" Tue Jun 22 20:45:02 2021 rev:7 rq:901270 version:20210619 Changes: -------- --- /work/SRC/openSUSE:Factory/cargo-audit-advisory-db/cargo-audit-advisory-db.changes 2021-06-01 10:41:31.573228237 +0200 +++ /work/SRC/openSUSE:Factory/.cargo-audit-advisory-db.new.2625/cargo-audit-advisory-db.changes 2021-06-22 20:45:11.238839499 +0200 @@ -1,0 +2,15 @@ +Sat Jun 19 06:27:26 UTC 2021 - wbr...@suse.de + +- Update to version 20210619: + * Update RUSTSEC-2021-0049.md (#941) + * Assigned RUSTSEC-2021-0071 to grep-cli (#940) + * crates/grep-cli: add advisory for arbitrary binary execution on Windows (#939) + * Add GHSA mentions to `aliases` field. This is becoming more important with OSV enabling interop between databases (#937) + * Update RUSTSEC-2020-0043.md (#934) + * Assigned RUSTSEC-2021-0070 to nalgebra (#932) + * Add advisory for nalgebra VecStorage/MatrixVec (#931) + * Remove range overlaps, fix some range specifications (#930) + * Make ranges in trust-dns-proto advisory non-overlapping (#929) + * Assigned RUSTSEC-2021-0069 to lettre (#925) + +------------------------------------------------------------------- Old: ---- advisory-db-20210601.tar.xz New: ---- advisory-db-20210619.tar.xz ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Other differences: ------------------ ++++++ cargo-audit-advisory-db.spec ++++++ --- /var/tmp/diff_new_pack.1gUMVl/_old 2021-06-22 20:45:11.762840076 +0200 +++ /var/tmp/diff_new_pack.1gUMVl/_new 2021-06-22 20:45:11.766840080 +0200 @@ -17,7 +17,7 @@ Name: cargo-audit-advisory-db -Version: 20210601 +Version: 20210619 Release: 0 Summary: A database of known security issues for Rust depedencies License: CC0-1.0 ++++++ _service ++++++ --- /var/tmp/diff_new_pack.1gUMVl/_old 2021-06-22 20:45:11.798840115 +0200 +++ /var/tmp/diff_new_pack.1gUMVl/_new 2021-06-22 20:45:11.802840119 +0200 @@ -2,7 +2,7 @@ <service mode="disabled" name="obs_scm"> <param name="url">https://github.com/RustSec/advisory-db.git</param> <param name="scm">git</param> - <param name="version">20210601</param> + <param name="version">20210619</param> <param name="revision">master</param> <param name="changesgenerate">enable</param> <param name="changesauthor">wbr...@suse.de</param> ++++++ advisory-db-20210601.tar.xz -> advisory-db-20210619.tar.xz ++++++ diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/advisory-db-20210601/.duplicate-id-guard new/advisory-db-20210619/.duplicate-id-guard --- old/advisory-db-20210601/.duplicate-id-guard 2021-05-22 20:13:18.000000000 +0200 +++ new/advisory-db-20210619/.duplicate-id-guard 2021-06-16 23:05:39.000000000 +0200 @@ -1,3 +1,3 @@ This file causes merge conflicts if two ID assignment jobs run concurrently. This prevents duplicate ID assignment due to a race between those jobs. -ff091e2402596ebe5667596b7b07f686f263921249d154a8b98e063059c521aa - +9ae15a1aa0407b9b02ec7b965943ec1541f88b9dcd54e9ba0d27a85a7cad4811 - diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/advisory-db-20210601/crates/arc-swap/RUSTSEC-2020-0091.md new/advisory-db-20210619/crates/arc-swap/RUSTSEC-2020-0091.md --- old/advisory-db-20210601/crates/arc-swap/RUSTSEC-2020-0091.md 2021-05-22 20:13:18.000000000 +0200 +++ new/advisory-db-20210619/crates/arc-swap/RUSTSEC-2020-0091.md 2021-06-16 23:05:39.000000000 +0200 @@ -9,7 +9,7 @@ aliases = ["CVE-2020-35711"] [versions] -patched = [">= 1.1.0", ">= 0.4.8"] +patched = [">= 0.4.8, < 1.0.0-0", ">= 1.1.0"] unaffected = ["< 0.4.2"] [affected] diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/advisory-db-20210601/crates/claxon/RUSTSEC-2018-0004.md new/advisory-db-20210619/crates/claxon/RUSTSEC-2018-0004.md --- old/advisory-db-20210601/crates/claxon/RUSTSEC-2018-0004.md 2021-05-22 20:13:18.000000000 +0200 +++ new/advisory-db-20210619/crates/claxon/RUSTSEC-2018-0004.md 2021-06-16 23:05:39.000000000 +0200 @@ -8,7 +8,7 @@ url = "https://github.com/ruuda/claxon/commit/8f28ec275e412dd3af4f3cda460605512faf332c" [versions] -patched = ["=0.3.2", ">= 0.4.1"] +patched = ["^0.3.2", ">= 0.4.1"] ``` # Malicious input could cause uninitialized memory to be exposed diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/advisory-db-20210601/crates/cranelift-codegen/RUSTSEC-2021-0067.md new/advisory-db-20210619/crates/cranelift-codegen/RUSTSEC-2021-0067.md --- old/advisory-db-20210601/crates/cranelift-codegen/RUSTSEC-2021-0067.md 2021-05-22 20:13:18.000000000 +0200 +++ new/advisory-db-20210619/crates/cranelift-codegen/RUSTSEC-2021-0067.md 2021-06-16 23:05:39.000000000 +0200 @@ -6,10 +6,10 @@ url = "https://github.com/bytecodealliance/wasmtime/security/advisories/GHSA-hpqh-2wqx-7qp5" categories = ["code-execution", "memory-corruption", "memory-exposure"] keywords = ["miscompile", "sandbox", "wasm"] -aliases = ["CVE-2021-32629"] +aliases = ["CVE-2021-32629", "GHSA-hpqh-2wqx-7qp5"] [versions] -patched = [">= 0.73.1", ">= 0.74"] +patched = [">= 0.73.1"] [affected] arch = ["x86"] diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/advisory-db-20210601/crates/grep-cli/RUSTSEC-2021-0071.md new/advisory-db-20210619/crates/grep-cli/RUSTSEC-2021-0071.md --- old/advisory-db-20210601/crates/grep-cli/RUSTSEC-2021-0071.md 1970-01-01 01:00:00.000000000 +0100 +++ new/advisory-db-20210619/crates/grep-cli/RUSTSEC-2021-0071.md 2021-06-16 23:05:39.000000000 +0200 @@ -0,0 +1,57 @@ +```toml +[advisory] +id = "RUSTSEC-2021-0071" +package = "grep-cli" +date = "2021-06-12" +url = "https://github.com/BurntSushi/ripgrep/issues/1773" +categories = ["code-execution"] +keywords = ["windows", "ripgrep", "PATH", "arbitrary", "binary"] +aliases = ["CVE-2021-3013"] + +[versions] +patched = [">= 0.1.6"] +unaffected = [] + +[affected] +os = ["windows"] +functions = { "grep_cli::DecompressionReader::new" = ["< 0.1.6"] } +``` + +# `grep-cli` may run arbitrary executables on Windows + +On Windows in versions of `grep-cli` prior to `0.1.6`, it's possible for some +of the routines to execute arbitrary executables. In particular, a quirk of +the Windows process execution API is that it will automatically consider the +current directory before other directories when resolving relative binary +names. Therefore, if you use `grep-cli` to read decompressed files in an +untrusted directory with that directory as the CWD, a malicious actor to could +put, e.g., a `gz.exe` binary in that directory and `grep-cli` will use the +malicious actor's version of `gz.exe` instead of the system's. + +This is also technically possible on Unix as well, but only if the `PATH` +variable contains `.`. Conventionally, they do not. + +A `DecompressionReader` has been fixed to automatically resolve binary names +using `PATH`, instead of relying on the Windows API to do it. + +If you use `grep-cli`'s `CommandReader` with a `std::process::Command` value +on Windows, then it is recommended to either construct the `Command` with an +absolute binary name, or use `grep-cli`'s new +[`resolve_binary`](https://docs.rs/grep-cli/0.1.6/grep_cli/fn.resolve_binary.html) +helper function. + +To be clear, `grep-cli 0.1.6` mitigates this issue in two ways: + +* A `DecompressionReader` will resolve decompression programs to absolute +paths automatically using the `PATH` environment variable, instead of relying +on Windows APIs to do it (which would result in the undesirable behavior of +checking the CWD for a program first). +* A new function, `resolve_binary`, was added to help users of this crate +mitigate this behavior when they need to create their own +`std::process::Command`. For example, +[ripgrep uses `grep_cli::resolve_binary`](https://github.com/BurntSushi/ripgrep/blob/7ce66f73cf7e76e9f2557922ac8e650eb02cf4ed/crates/core/search.rs#L119-L122) +on the argument given to its `--pre` flag. + +While the first mitigation fixes this issue for sensible values of `PATH` +when doing decompression search, the second mitigation is imperfect. The more +fundamental issue is that `std::process::Command` is itself vulnerable to this. diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/advisory-db-20210601/crates/hyper/RUSTSEC-2021-0020.md new/advisory-db-20210619/crates/hyper/RUSTSEC-2021-0020.md --- old/advisory-db-20210601/crates/hyper/RUSTSEC-2021-0020.md 2021-05-22 20:13:18.000000000 +0200 +++ new/advisory-db-20210619/crates/hyper/RUSTSEC-2021-0020.md 2021-06-16 23:05:39.000000000 +0200 @@ -6,7 +6,7 @@ url = "https://github.com/hyperium/hyper/security/advisories/GHSA-6hfq-h8hq-87mf" categories = ["format-injection"] keywords = ["http", "request-smuggling"] -aliases = ["CVE-2021-21299"] +aliases = ["CVE-2021-21299", "GHSA-6hfq-h8hq-87mf"] [versions] patched = [">= 0.14.3", "0.13.10", "0.12.36"] diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/advisory-db-20210601/crates/libpulse-binding/RUSTSEC-2018-0020.md new/advisory-db-20210619/crates/libpulse-binding/RUSTSEC-2018-0020.md --- old/advisory-db-20210601/crates/libpulse-binding/RUSTSEC-2018-0020.md 2021-05-22 20:13:18.000000000 +0200 +++ new/advisory-db-20210619/crates/libpulse-binding/RUSTSEC-2018-0020.md 2021-06-16 23:05:39.000000000 +0200 @@ -5,6 +5,7 @@ date = "2018-12-22" url = "https://github.com/jnqnfe/pulse-binding-rust/security/advisories/GHSA-f56g-chqp-22m9" categories = ["memory-corruption"] +aliases = ["GHSA-f56g-chqp-22m9"] [versions] patched = [">= 2.5.0"] diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/advisory-db-20210601/crates/libpulse-binding/RUSTSEC-2018-0021.md new/advisory-db-20210619/crates/libpulse-binding/RUSTSEC-2018-0021.md --- old/advisory-db-20210601/crates/libpulse-binding/RUSTSEC-2018-0021.md 2021-05-22 20:13:18.000000000 +0200 +++ new/advisory-db-20210619/crates/libpulse-binding/RUSTSEC-2018-0021.md 2021-06-16 23:05:39.000000000 +0200 @@ -5,6 +5,7 @@ date = "2018-06-15" url = "https://github.com/jnqnfe/pulse-binding-rust/security/advisories/GHSA-ghpq-vjxw-ch5w" categories = ["memory-corruption"] +aliases = ["GHSA-ghpq-vjxw-ch5w"] [versions] patched = [">= 1.2.1"] diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/advisory-db-20210601/crates/miow/RUSTSEC-2020-0080.md new/advisory-db-20210619/crates/miow/RUSTSEC-2020-0080.md --- old/advisory-db-20210601/crates/miow/RUSTSEC-2020-0080.md 2021-05-22 20:13:18.000000000 +0200 +++ new/advisory-db-20210619/crates/miow/RUSTSEC-2020-0080.md 2021-06-16 23:05:39.000000000 +0200 @@ -9,7 +9,7 @@ informational = "unsound" [versions] -patched = [">= 0.2.2", ">= 0.3.6"] +patched = ["^ 0.2.2", ">= 0.3.6"] ``` # `miow` invalidly assumes the memory layout of std::net::SocketAddr diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/advisory-db-20210601/crates/nalgebra/RUSTSEC-2021-0070.md new/advisory-db-20210619/crates/nalgebra/RUSTSEC-2021-0070.md --- old/advisory-db-20210601/crates/nalgebra/RUSTSEC-2021-0070.md 1970-01-01 01:00:00.000000000 +0100 +++ new/advisory-db-20210619/crates/nalgebra/RUSTSEC-2021-0070.md 2021-06-16 23:05:39.000000000 +0200 @@ -0,0 +1,21 @@ +```toml +[advisory] +id = "RUSTSEC-2021-0070" +package = "nalgebra" +date = "2021-06-06" +url = "https://github.com/dimforge/nalgebra/issues/883" +categories = ["memory-corruption", "memory-exposure"] +keywords = ["memory-safety"] + +[versions] +patched = [">= 0.27.1"] +unaffected = ["< 0.11.0"] +``` + +# VecStorage Deserialize Allows Violation of Length Invariant + +The `Deserialize` implementation for `VecStorage` did not maintain the invariant that the number of elements must equal `nrows * ncols`. Deserialization of specially crafted inputs could allow memory access beyond allocation of the vector. + +This flaw was introduced in v0.11.0 ([`086e6e`](https://github.com/dimforge/nalgebra/commit/086e6e719f53fecba6dadad2e953a487976387f5)) due to the addition of an automatically derived implementation of `Deserialize` for `MatrixVec`. `MatrixVec` was later renamed to `VecStorage` in v0.16.13 ([`0f66403`](https://github.com/dimforge/nalgebra/commit/0f66403cbbe9eeac15cedd8a906c0d6a3d8841f2)) and continued to use the automatically derived implementation of `Deserialize`. + +This flaw was corrected in commit [`5bff536`](https://github.com/dimforge/nalgebra/commit/5bff5368bf38ddfa31416e4ae9897b163031a513) by returning an error during deserialization if the number of elements does not exactly match the expected size. diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/advisory-db-20210601/crates/rand_core/RUSTSEC-2019-0035.md new/advisory-db-20210619/crates/rand_core/RUSTSEC-2019-0035.md --- old/advisory-db-20210601/crates/rand_core/RUSTSEC-2019-0035.md 2021-05-22 20:13:18.000000000 +0200 +++ new/advisory-db-20210619/crates/rand_core/RUSTSEC-2019-0035.md 2021-06-16 23:05:39.000000000 +0200 @@ -12,7 +12,7 @@ "rand_core::BlockRng::next_u64" = ["< 0.4.2"] [versions] -patched = [">= 0.3.1", ">= 0.4.2"] +patched = ["^ 0.3.1", ">= 0.4.2"] ``` # Unaligned memory access diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/advisory-db-20210601/crates/through/RUSTSEC-2021-0049.md new/advisory-db-20210619/crates/through/RUSTSEC-2021-0049.md --- old/advisory-db-20210601/crates/through/RUSTSEC-2021-0049.md 2021-05-22 20:13:18.000000000 +0200 +++ new/advisory-db-20210619/crates/through/RUSTSEC-2021-0049.md 2021-06-16 23:05:39.000000000 +0200 @@ -2,7 +2,7 @@ [advisory] id = "RUSTSEC-2021-0049" package = "through" -aliases = ["CVE-2021-299340"] +aliases = ["CVE-2021-29940"] date = "2021-02-18" url = "https://github.com/gretchenfrage/through/issues/1" categories = ["memory-corruption"] diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/advisory-db-20210601/crates/trust-dns-proto/RUSTSEC-2018-0007.md new/advisory-db-20210619/crates/trust-dns-proto/RUSTSEC-2018-0007.md --- old/advisory-db-20210601/crates/trust-dns-proto/RUSTSEC-2018-0007.md 2021-05-22 20:13:18.000000000 +0200 +++ new/advisory-db-20210619/crates/trust-dns-proto/RUSTSEC-2018-0007.md 2021-06-16 23:05:39.000000000 +0200 @@ -7,7 +7,7 @@ keywords = ["stack-overflow", "crash"] [versions] -patched = [">= 0.4.3", ">= 0.5.0-alpha.3"] +patched = [">= 0.4.3"] ``` # Stack overflow when parsing malicious DNS packet diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/advisory-db-20210601/crates/ws/RUSTSEC-2020-0043.md new/advisory-db-20210619/crates/ws/RUSTSEC-2020-0043.md --- old/advisory-db-20210601/crates/ws/RUSTSEC-2020-0043.md 2021-05-22 20:13:18.000000000 +0200 +++ new/advisory-db-20210619/crates/ws/RUSTSEC-2020-0043.md 2021-06-16 23:05:39.000000000 +0200 @@ -18,4 +18,4 @@ This allows a remote attacker to take down the process by growing the buffer of their (single) connection until the process runs out of memory it can allocate and is killed. -The flaw was corrected in the [`parity-ws` fork](https://crates.io/crates/parity-ws) (>0.10.0) by [disconnecting a client when the buffer runs full](https://github.com/housleyjk/ws-rs/pull/328). +The flaw was corrected in the [`parity-ws` fork](https://crates.io/crates/parity-ws) (>=0.10.0) by [disconnecting a client when the buffer runs full](https://github.com/housleyjk/ws-rs/pull/328).