ALT-BU-2022-7335-1
Branch sisyphus_riscv64 update bulletin.
Package capnproto updated to version 0.10.3-alt1 for branch sisyphus_riscv64.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2022-46149
Cap'n Proto is a data interchange format and remote procedure call (RPC) system. Cap'n Proro prior to versions 0.7.1, 0.8.1, 0.9.2, and 0.10.3, as well as versions of Cap'n Proto's Rust implementation prior to 0.13.7, 0.14.11, and 0.15.2 are vulnerable to out-of-bounds read due to logic error handling list-of-list. This issue may lead someone to remotely segfault a peer by sending it a malicious message, if the victim performs certain actions on a list-of-pointer type. Exfiltration of memory is possible if the victim performs additional certain actions on a list-of-pointer type. To be vulnerable, an application must perform a specific sequence of actions, described in the GitHub Security Advisory. The bug is present in inlined code, therefore the fix will require rebuilding dependent applications. Cap'n Proto has C++ fixes available in versions 0.7.1, 0.8.1, 0.9.2, and 0.10.3. The `capnp` Rust crate has fixes available in versions 0.13.7, 0.14.11, and 0.15.2.
- https://github.com/capnproto/capnproto/commit/25d34c67863fd960af34fc4f82a7ca3362ee74b9
- https://github.com/capnproto/capnproto/commit/25d34c67863fd960af34fc4f82a7ca3362ee74b9
- https://github.com/capnproto/capnproto/security/advisories/GHSA-qqff-4vw4-f6hx
- https://github.com/capnproto/capnproto/security/advisories/GHSA-qqff-4vw4-f6hx
- FEDORA-2022-7002ec8b22
- FEDORA-2022-7002ec8b22
- FEDORA-2022-fd7eeedd02
- FEDORA-2022-fd7eeedd02
- FEDORA-2022-5d37367673
- FEDORA-2022-5d37367673
- FEDORA-2022-18023b665f
- FEDORA-2022-18023b665f
Package libarchive updated to version 3.6.1-alt2 for branch sisyphus_riscv64.
Closed vulnerabilities
BDU:2022-07496
Уязвимость функции calloc() библиотеки архивирования libarchive, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2022-36227
In libarchive before 3.6.2, the software does not check for an error after calling calloc function that can return with a NULL pointer if the function fails, which leads to a resultant NULL pointer dereference. NOTE: the discoverer cites this CWE-476 remark but third parties dispute the code-execution impact: "In rare circumstances, when NULL is equivalent to the 0x0 memory address and privileged code can access it, then writing or reading memory is possible, which may lead to code execution."
- https://bugs.gentoo.org/882521
- https://github.com/libarchive/libarchive/blob/v3.0.0a/libarchive/archive_write.c#L215
- https://github.com/libarchive/libarchive/issues/1754
- [debian-lts-announce] 20230130 [SECURITY] [DLA 3294-1] libarchive security update
- FEDORA-2022-e15be0091f
- GLSA-202309-14
- https://bugs.gentoo.org/882521
- GLSA-202309-14
- FEDORA-2022-e15be0091f
- [debian-lts-announce] 20230130 [SECURITY] [DLA 3294-1] libarchive security update
- https://github.com/libarchive/libarchive/issues/1754
- https://github.com/libarchive/libarchive/blob/v3.0.0a/libarchive/archive_write.c#L215
Package libICE updated to version 1.1.0-alt2 for branch sisyphus_riscv64.
Closed bugs
stl_algo.h:5879:60: error: macro "static_assert" passed 5 arguments, but takes just 2