Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 864055 - dev-util/cargo-audit: 'cargo audit' reports one or more bundled CRATES as vulnerable
Summary: dev-util/cargo-audit: 'cargo audit' reports one or more bundled CRATES as vul...
Status: RESOLVED FIXED
Alias: None
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal normal
Assignee: Gentoo Security
URL:
Whiteboard:
Keywords:
Depends on:
Blocks:
 
Reported: 2022-08-06 15:32 UTC by Agostino Sarubbo
Modified: 2023-06-27 06:43 UTC (History)
2 users (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Agostino Sarubbo gentoo-dev 2022-08-06 15:32:20 UTC
Dear maintainer(s),
'cargo audit' reports one or more bundled CRATES as vulnerable.
To reproduce please install dev-util/cargo-audit and run:
cargo audit --file Cargo.lock
where Cargo.lock is generated during the build of this package.

For simplicity, I'm attaching here the content of 'cargo audit' here:

      Loaded 433 security advisories (from /tmp/advisory-db)
    Scanning Cargo.lock for vulnerabilities (448 crate dependencies)
Crate:     chrono
Version:   0.4.19
Title:     Potential segfault in `localtime_r` invocations
Date:      2020-11-10
ID:        RUSTSEC-2020-0159
URL:       https://rustsec.org/advisories/RUSTSEC-2020-0159
Solution:  Upgrade to >=0.4.20
Dependency tree:
chrono 0.4.19

Crate:     hyper
Version:   0.13.10
Title:     Lenient `hyper` header parsing of `Content-Length` could allow request smuggling
Date:      2021-07-07
ID:        RUSTSEC-2021-0078
URL:       https://rustsec.org/advisories/RUSTSEC-2021-0078
Solution:  Upgrade to >=0.14.10
Dependency tree:
hyper 0.13.10

Crate:     hyper
Version:   0.13.10
Title:     Integer overflow in `hyper`'s parsing of the `Transfer-Encoding` header leads to data loss
Date:      2021-07-07
ID:        RUSTSEC-2021-0079
URL:       https://rustsec.org/advisories/RUSTSEC-2021-0079
Solution:  Upgrade to >=0.14.10

Crate:     openssl-src
Version:   111.15.0
Title:     SM2 Decryption Buffer Overflow
Date:      2021-08-24
ID:        RUSTSEC-2021-0097
URL:       https://rustsec.org/advisories/RUSTSEC-2021-0097
Solution:  Upgrade to >=111.16
Dependency tree:
openssl-src 111.15.0

Crate:     openssl-src
Version:   111.15.0
Title:     Read buffer overruns processing ASN.1 strings
Date:      2021-08-24
ID:        RUSTSEC-2021-0098
URL:       https://rustsec.org/advisories/RUSTSEC-2021-0098
Solution:  Upgrade to >=111.16

Crate:     openssl-src
Version:   111.15.0
Title:     Infinite loop in `BN_mod_sqrt()` reachable when parsing certificates
Date:      2022-03-15
ID:        RUSTSEC-2022-0014
URL:       https://rustsec.org/advisories/RUSTSEC-2022-0014
Solution:  Upgrade to >=111.18, <300.0 OR >=300.0.5

Crate:     openssl-src
Version:   111.15.0
Title:     AES OCB fails to encrypt some bytes
Date:      2022-07-05
ID:        RUSTSEC-2022-0032
URL:       https://rustsec.org/advisories/RUSTSEC-2022-0032
Solution:  Upgrade to >=111.22, <300.0 OR >=300.0.9

Crate:     openssl-src
Version:   111.18.0
Title:     AES OCB fails to encrypt some bytes
Date:      2022-07-05
ID:        RUSTSEC-2022-0032
URL:       https://rustsec.org/advisories/RUSTSEC-2022-0032
Solution:  Upgrade to >=111.22, <300.0 OR >=300.0.9
Dependency tree:
openssl-src 111.18.0

Crate:     owning_ref
Version:   0.4.1
Title:     Multiple soundness issues in `owning_ref`
Date:      2022-01-26
ID:        RUSTSEC-2022-0040
URL:       https://rustsec.org/advisories/RUSTSEC-2022-0040
Solution:  No fixed upgrade is available!
Dependency tree:
owning_ref 0.4.1

Crate:     regex
Version:   1.5.4
Title:     Regexes with large repetitions on empty sub-expressions take a very long time to parse
Date:      2022-03-08
ID:        RUSTSEC-2022-0013
URL:       https://rustsec.org/advisories/RUSTSEC-2022-0013
Solution:  Upgrade to >=1.5.5
Dependency tree:
regex 1.5.4

Crate:     rust-embed
Version:   5.9.0
Title:     RustEmbed generated `get` method allows for directory traversal when reading files from disk
Date:      2021-11-29
ID:        RUSTSEC-2021-0126
URL:       https://rustsec.org/advisories/RUSTSEC-2021-0126
Solution:  Upgrade to >=6.3.0
Dependency tree:
rust-embed 5.9.0

Crate:     time
Version:   0.1.43
Title:     Potential segfault in the time crate
Date:      2020-11-18
ID:        RUSTSEC-2020-0071
URL:       https://rustsec.org/advisories/RUSTSEC-2020-0071
Solution:  Upgrade to >=0.2.23
Dependency tree:
time 0.1.43

Crate:     tokio
Version:   0.2.25
Title:     Data race when sending and receiving after closing a `oneshot` channel
Date:      2021-11-16
ID:        RUSTSEC-2021-0124
URL:       https://rustsec.org/advisories/RUSTSEC-2021-0124
Solution:  Upgrade to >=1.8.4, <1.9.0 OR >=1.13.1
Dependency tree:
tokio 0.2.25

Crate:     failure
Version:   0.1.8
Warning:   unmaintained
Title:     failure is officially deprecated/unmaintained
Date:      2020-05-02
ID:        RUSTSEC-2020-0036
URL:       https://rustsec.org/advisories/RUSTSEC-2020-0036
Dependency tree:
failure 0.1.8

Crate:     net2
Version:   0.2.37
Warning:   unmaintained
Title:     `net2` crate has been deprecated; use `socket2` instead
Date:      2020-05-01
ID:        RUSTSEC-2020-0016
URL:       https://rustsec.org/advisories/RUSTSEC-2020-0016
Dependency tree:
net2 0.2.37

error: 13 vulnerabilities found!
warning: 2 allowed warnings found
Comment 1 Larry the Git Cow gentoo-dev 2023-06-27 06:43:15 UTC
The bug has been closed via the following commit(s):

https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=fdb8e33cafaa250f179b6f86a42d53dfa090a78e

commit fdb8e33cafaa250f179b6f86a42d53dfa090a78e
Author:     Sam James <sam@gentoo.org>
AuthorDate: 2023-06-27 06:39:21 +0000
Commit:     Sam James <sam@gentoo.org>
CommitDate: 2023-06-27 06:42:12 +0000

    dev-util/cargo-audit: add 0.17.6
    
    Closes: https://bugs.gentoo.org/864055
    Signed-off-by: Sam James <sam@gentoo.org>

 dev-util/cargo-audit/Manifest                  | 196 +++++++++++++++
 dev-util/cargo-audit/cargo-audit-0.17.6.ebuild | 328 +++++++++++++++++++++++++
 2 files changed, 524 insertions(+)