Script 'mail_helper' called by obssrc
Hello community,

here is the log from the commit of package cargo-audit-advisory-db for 
openSUSE:Factory checked in at 2021-11-30 23:16:02
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Factory/cargo-audit-advisory-db (Old)
 and      /work/SRC/openSUSE:Factory/.cargo-audit-advisory-db.new.31177 (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Package is "cargo-audit-advisory-db"

Tue Nov 30 23:16:02 2021 rev:16 rq:934647 version:20211130

Changes:
--------
--- 
/work/SRC/openSUSE:Factory/cargo-audit-advisory-db/cargo-audit-advisory-db.changes
  2021-11-12 16:00:09.614589797 +0100
+++ 
/work/SRC/openSUSE:Factory/.cargo-audit-advisory-db.new.31177/cargo-audit-advisory-db.changes
       2021-12-02 02:10:48.443476411 +0100
@@ -1,0 +2,15 @@
+Tue Nov 30 02:12:58 UTC 2021 - [email protected]
+
+- Update to version 20211130:
+  * Assigned RUSTSEC-2021-0126 to rust-embed (#1113)
+  * Add advisory for rust-embed path traversal (#1112)
+  * Adds maintained alternative to slice_deque (#1109)
+  * Assigned RUSTSEC-2021-0125 to simple_asn1 (#1108)
+  * Security advisory on simple_asn1 version 0.6.0 (#1103)
+  * Assigned RUSTSEC-2021-0124 to tokio (#1107)
+  * Add advisory for tokio-rs/tokio#4225 (#1106)
+  * Add CVE for RUSTSEC-2021-0123 (#1105)
+  * Assigned RUSTSEC-2021-0123 to fruity (#1104)
+  * Add fruity advisory for nvzqz/fruity#14 (#1102)
+
+-------------------------------------------------------------------

Old:
----
  advisory-db-20211112.tar.xz

New:
----
  advisory-db-20211130.tar.xz

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Other differences:
------------------
++++++ cargo-audit-advisory-db.spec ++++++
--- /var/tmp/diff_new_pack.Ul63K0/_old  2021-12-02 02:10:48.851475167 +0100
+++ /var/tmp/diff_new_pack.Ul63K0/_new  2021-12-02 02:10:48.855475154 +0100
@@ -17,7 +17,7 @@
 
 
 Name:           cargo-audit-advisory-db
-Version:        20211112
+Version:        20211130
 Release:        0
 Summary:        A database of known security issues for Rust depedencies
 License:        CC0-1.0

++++++ _service ++++++
--- /var/tmp/diff_new_pack.Ul63K0/_old  2021-12-02 02:10:48.879475081 +0100
+++ /var/tmp/diff_new_pack.Ul63K0/_new  2021-12-02 02:10:48.879475081 +0100
@@ -2,7 +2,7 @@
   <service mode="disabled" name="obs_scm">
     <param name="url">https://github.com/RustSec/advisory-db.git</param>
     <param name="scm">git</param>
-    <param name="version">20211112</param>
+    <param name="version">20211130</param>
     <param name="revision">master</param>
     <param name="changesgenerate">enable</param>
     <param name="changesauthor">[email protected]</param>

++++++ advisory-db-20211112.tar.xz -> advisory-db-20211130.tar.xz ++++++
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/advisory-db-20211112/.duplicate-id-guard 
new/advisory-db-20211130/.duplicate-id-guard
--- old/advisory-db-20211112/.duplicate-id-guard        2021-11-07 
18:53:20.000000000 +0100
+++ new/advisory-db-20211130/.duplicate-id-guard        2021-11-29 
19:32:40.000000000 +0100
@@ -1,3 +1,3 @@
 This file causes merge conflicts if two ID assignment jobs run concurrently.
 This prevents duplicate ID assignment due to a race between those jobs.
-9042bc5cd75d598f6aabe16f7a520b6886ac5abe65319eaee6cb8650f0e3085a  -
+e4ababe809f177f95608bb105f034fdf7b1379c3ab84f9083b37f4356f609597  -
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/advisory-db-20211112/.github/workflows/assign-ids.yml 
new/advisory-db-20211130/.github/workflows/assign-ids.yml
--- old/advisory-db-20211112/.github/workflows/assign-ids.yml   2021-11-07 
18:53:20.000000000 +0100
+++ new/advisory-db-20211130/.github/workflows/assign-ids.yml   2021-11-29 
19:32:40.000000000 +0100
@@ -15,12 +15,12 @@
       uses: actions/cache@v1
       with:
         path: ~/.cargo/bin
-        key: rustsec-admin-v0.5.3
+        key: rustsec-admin-v0.6.0
 
     - name: Install rustsec-admin
       run: |
         if [ ! -f $HOME/.cargo/bin/rustsec-admin ]; then
-            cargo install rustsec-admin --vers 0.5.3
+            cargo install rustsec-admin --vers 0.6.0
         fi
 
     - name: Assign IDs
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/advisory-db-20211112/.github/workflows/export-osv.yml 
new/advisory-db-20211130/.github/workflows/export-osv.yml
--- old/advisory-db-20211112/.github/workflows/export-osv.yml   2021-11-07 
18:53:20.000000000 +0100
+++ new/advisory-db-20211130/.github/workflows/export-osv.yml   2021-11-29 
19:32:40.000000000 +0100
@@ -14,10 +14,10 @@
       - uses: actions/cache@v1
         with:
           path: ~/.cargo/bin
-          key: rustsec-admin-v0.5.3
+          key: rustsec-admin-v0.6.0
       - run: |
           if [ ! -f $HOME/.cargo/bin/rustsec-admin ]; then
-           cargo install rustsec-admin --vers 0.5.3
+           cargo install rustsec-admin --vers 0.6.0
           fi
           mkdir -p crates
           rustsec-admin osv crates
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/advisory-db-20211112/.github/workflows/publish-web.yml 
new/advisory-db-20211130/.github/workflows/publish-web.yml
--- old/advisory-db-20211112/.github/workflows/publish-web.yml  2021-11-07 
18:53:20.000000000 +0100
+++ new/advisory-db-20211130/.github/workflows/publish-web.yml  2021-11-29 
19:32:40.000000000 +0100
@@ -14,10 +14,10 @@
       - uses: actions/cache@v1
         with:
           path: ~/.cargo/bin
-          key: rustsec-admin-v0.5.3
+          key: rustsec-admin-v0.6.0
       - run: |
           if [ ! -f $HOME/.cargo/bin/rustsec-admin ]; then
-           cargo install rustsec-admin --vers 0.5.3
+           cargo install rustsec-admin --vers 0.6.0
           fi
           rustsec-admin web .
           git config user.name github-actions
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/advisory-db-20211112/.github/workflows/validate.yml 
new/advisory-db-20211130/.github/workflows/validate.yml
--- old/advisory-db-20211112/.github/workflows/validate.yml     2021-11-07 
18:53:20.000000000 +0100
+++ new/advisory-db-20211130/.github/workflows/validate.yml     2021-11-29 
19:32:40.000000000 +0100
@@ -16,12 +16,12 @@
       uses: actions/cache@v1
       with:
         path: ~/.cargo/bin
-        key: rustsec-admin-v0.5.3
+        key: rustsec-admin-v0.6.0
 
     - name: Install rustsec-admin
       run: |
         if [ ! -f $HOME/.cargo/bin/rustsec-admin ]; then
-            cargo install rustsec-admin --vers 0.5.3
+            cargo install rustsec-admin --vers 0.6.0
         fi
 
     - name: Lint advisories
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/advisory-db-20211112/crates/fruity/RUSTSEC-2021-0123.md 
new/advisory-db-20211130/crates/fruity/RUSTSEC-2021-0123.md
--- old/advisory-db-20211112/crates/fruity/RUSTSEC-2021-0123.md 1970-01-01 
01:00:00.000000000 +0100
+++ new/advisory-db-20211130/crates/fruity/RUSTSEC-2021-0123.md 2021-11-29 
19:32:40.000000000 +0100
@@ -0,0 +1,58 @@
+```toml
+[advisory]
+id = "RUSTSEC-2021-0123"
+package = "fruity"
+aliases = ["CVE-2021-43620"]
+date = "2021-11-14"
+url = "https://github.com/nvzqz/fruity/issues/14";
+
+[affected.functions]
+"fruity::foundation::NSString::to_str" = ["> 0.0.0"]
+"fruity::foundation::NSString::to_str_with_nul" = ["> 0.0.0"]
+"fruity::foundation::NSString::to_string" = ["> 0.0.0"]
+"fruity::foundation::NSString::to_string_with_nul" = ["> 0.0.0"]
+
+[versions]
+patched = []
+```
+
+# Converting `NSString` to a String Truncates at Null Bytes
+
+Methods of [`NSString`] for conversion to a string may return a partial result.
+Since they call [`CStr::from_ptr`] on a pointer to the string buffer, the
+string is terminated at the first null byte, which might not be the end of the
+string.
+
+In addition to the vulnerable functions listed for this issue, the
+implementations of [`Display`], [`PartialEq`], [`PartialOrd`], and [`ToString`]
+for [`NSString`] are also affected, since they call those functions.
+
+## Impact
+
+Since [`NSString`] is commonly used as the type for paths by the [Foundation]
+framework, null byte truncation might allow for easily bypassing file extension
+checks. For example, if a file name is provided by a user and validated to have
+one of a specific set of extensions, with validation taking place before
+truncation, an attacker can add an accepted extension after a null byte (e.g.,
+`file.exe\0.txt`). After truncation, the file name used by the application
+would be `file.exe`.
+
+It would be better to generate unique names for files, instead of using
+user-provided names, but not all applications take this approach.
+
+## Example:
+
+```rust
+let string = NSString::from_str("null\0byte");
+println!("{}", string);
+```
+
+That example only prints the string "null".
+
+[`CStr::from_ptr`]: 
https://doc.rust-lang.org/std/ffi/struct.CStr.html#method.from_ptr
+[`Display`]: https://doc.rust-lang.org/std/fmt/trait.Display.html
+[Foundation]: https://developer.apple.com/documentation/foundation
+[`NSString`]: 
https://docs.rs/fruity/0.2.0/fruity/foundation/struct.NSString.html
+[`PartialEq`]: https://doc.rust-lang.org/std/cmp/trait.PartialEq.html
+[`PartialOrd`]: https://doc.rust-lang.org/std/cmp/trait.PartialOrd.html
+[`ToString`]: https://doc.rust-lang.org/std/string/trait.ToString.html
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/advisory-db-20211112/crates/rust-embed/RUSTSEC-2021-0126.md 
new/advisory-db-20211130/crates/rust-embed/RUSTSEC-2021-0126.md
--- old/advisory-db-20211112/crates/rust-embed/RUSTSEC-2021-0126.md     
1970-01-01 01:00:00.000000000 +0100
+++ new/advisory-db-20211130/crates/rust-embed/RUSTSEC-2021-0126.md     
2021-11-29 19:32:40.000000000 +0100
@@ -0,0 +1,36 @@
+```toml
+[advisory]
+id = "RUSTSEC-2021-0126"
+package = "rust-embed"
+date = "2021-11-29"
+url = "https://github.com/pyros2097/rust-embed/issues/159";
+categories = ["file-disclosure"]
+
+[versions]
+patched = [">= 6.3.0"]
+```
+
+# RustEmbed generated `get` method allows for directory traversal when reading 
files from disk
+
+When running in debug mode and the `debug-embed` (off by default) feature is
+not enabled, the generated `get` method does not check that the input path is
+a child of the folder given. 
+
+This allows attackers to read arbitrary files in the file system if they have
+control over the filename given. The following code will print the contents of
+your `/etc/passwd` if adjusted with a correct number of `../`s depending on
+where it is run from.
+
+```rust
+#[derive(rust_embed::RustEmbed)]
+#[folder = "src/"]
+pub struct Asset;
+
+fn main() {
+    let d = Asset::get("../../../etc/passwd").unwrap().data;
+    println!("{}", String::from_utf8_lossy(&d));
+}
+```
+
+The flaw was corrected by canonicalizing the input filename and ensuring that
+it starts with the canonicalized folder path.
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/advisory-db-20211112/crates/simple_asn1/RUSTSEC-2021-0125.md 
new/advisory-db-20211130/crates/simple_asn1/RUSTSEC-2021-0125.md
--- old/advisory-db-20211112/crates/simple_asn1/RUSTSEC-2021-0125.md    
1970-01-01 01:00:00.000000000 +0100
+++ new/advisory-db-20211130/crates/simple_asn1/RUSTSEC-2021-0125.md    
2021-11-29 19:32:40.000000000 +0100
@@ -0,0 +1,37 @@
+```toml
+[advisory]
+id = "RUSTSEC-2021-0125"
+package = "simple_asn1"
+date = "2021-11-14"
+url = "https://github.com/acw/simple_asn1/issues/27";
+categories = ["denial-of-service"]
+keywords = ["panic", "string_slice"]
+#aliases = ["CVE-YYYY-NNNN"]
+#cvss = "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H"
+
+[versions]
+patched = [">=0.6.1"]
+unaffected = ["<0.6.0"]
+```
+
+# Panic on incorrect date input to `simple_asn1`
+
+Version 0.6.0 of the `simple_asn1` crate panics on certain malformed
+inputs to its parsing functions, including `from_der` and `der_decode`.
+Because this crate is frequently used with inputs from the network, this
+should be considered a security vulnerability.
+
+The issue occurs when parsing the old ASN.1 "UTCTime" time format.  If an
+attacker provides a UTCTime where the first character is ASCII but the
+second character is above 0x7f, a string slice operation in the
+`from_der_` function will try to slice into the middle of a UTF-8
+character, and cause a panic.
+
+This error was introduced in commit
+[`d7d39d709577710e9dc8`](https://github.com/acw/simple_asn1/commit/d7d39d709577710e9dc8833ee57d200eef366db8),
+which updated `simple_asn1` to use `time` instead of `chrono` because of
+[`RUSTSEC-2020-159`](https://rustsec.org/advisories/RUSTSEC-2020-0159).
+Versions of `simple_asn1` before 0.6.0 are not affected by this issue.
+
+The [patch](https://github.com/acw/simple_asn1/pull/28) was applied in
+`simple_asn1` version 0.6.1.
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/advisory-db-20211112/crates/slice-deque/RUSTSEC-2020-0158.md 
new/advisory-db-20211130/crates/slice-deque/RUSTSEC-2020-0158.md
--- old/advisory-db-20211112/crates/slice-deque/RUSTSEC-2020-0158.md    
2021-11-07 18:53:20.000000000 +0100
+++ new/advisory-db-20211130/crates/slice-deque/RUSTSEC-2020-0158.md    
2021-11-29 19:32:40.000000000 +0100
@@ -13,3 +13,7 @@
 # slice-deque is unmaintained
 
 The author of the `slice-deque` crate is unresponsive and is not receiving 
security patches.
+
+Maintained alternatives:
+
+- [`slice-ring-buffer`](https://crates.io/crates/slice-ring-buffer)
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/advisory-db-20211112/crates/tokio/RUSTSEC-2021-0124.md 
new/advisory-db-20211130/crates/tokio/RUSTSEC-2021-0124.md
--- old/advisory-db-20211112/crates/tokio/RUSTSEC-2021-0124.md  1970-01-01 
01:00:00.000000000 +0100
+++ new/advisory-db-20211130/crates/tokio/RUSTSEC-2021-0124.md  2021-11-29 
19:32:40.000000000 +0100
@@ -0,0 +1,38 @@
+```toml
+[advisory]
+id = "RUSTSEC-2021-0124"
+package = "tokio"
+date = "2021-11-16"
+url = "https://github.com/tokio-rs/tokio/issues/4225";
+categories = ["memory-corruption", "thread-safety"]
+keywords = ["race condition"]
+
+[versions]
+patched = [">= 1.8.4, < 1.9.0", ">= 1.13.1"]
+unaffected = ["< 0.1.14"]
+
+[affected.functions]
+"tokio::sync::oneshot::Receiver::close" = ["<= 1.13.0, >= 0.1.14"]
+```
+
+# Data race when sending and receiving after closing a `oneshot` channel
+
+If a `tokio::sync::oneshot` channel is closed (via the
+[`oneshot::Receiver::close`] method), a data race may occur if the
+`oneshot::Sender::send` method is called while the corresponding
+`oneshot::Receiver` is `await`ed or calling `try_recv`.
+
+When these methods are called concurrently on a closed channel, the two halves
+of the channel can concurrently access a shared memory location, resulting in a
+data race. This has been observed to [cause memory corruption][corruption].
+
+Note that the race only occurs when **both** halves of the channel are used
+after the `Receiver` half has called `close`. Code where `close` is not used, 
or where the
+`Receiver` is not `await`ed and `try_recv` is not called after calling `close`,
+is not affected.
+
+See [tokio#4225][issue] for more details.
+
+[corruption]: 
https://github.com/tokio-rs/tokio/issues/4225#issuecomment-967434847
+[issue]: https://github.com/tokio-rs/tokio/issues/4225
+[`oneshot::Receiver::close`]: 
https://docs.rs/tokio/1.14.0/tokio/sync/oneshot/struct.Receiver.html#method.close

Reply via email to