Script 'mail_helper' called by obssrc
Hello community,

here is the log from the commit of package cargo-audit-advisory-db for 
openSUSE:Factory checked in at 2023-10-27 22:28:30
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Factory/cargo-audit-advisory-db (Old)
 and      /work/SRC/openSUSE:Factory/.cargo-audit-advisory-db.new.17445 (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Package is "cargo-audit-advisory-db"

Fri Oct 27 22:28:30 2023 rev:37 rq:1120660 version:20231027

Changes:
--------
--- 
/work/SRC/openSUSE:Factory/cargo-audit-advisory-db/cargo-audit-advisory-db.changes
  2023-10-08 12:21:50.113743998 +0200
+++ 
/work/SRC/openSUSE:Factory/.cargo-audit-advisory-db.new.17445/cargo-audit-advisory-db.changes
       2023-10-27 22:29:01.829356991 +0200
@@ -1,0 +2,15 @@
+Fri Oct 27 03:02:30 UTC 2023 - [email protected]
+
+- Update to version 20231027:
+  * Assigned RUSTSEC-2023-0068 to cocoon (#1810)
+  * cocoon: sequential calls of encryption API result in nonce reuse (<=0.3.3) 
(#1805)
+  * Updating information about replacements (#1803)
+  * Assigned RUSTSEC-2023-0067 to fehler (#1801)
+  * fehler is unmaintained (#1800)
+  * Assigned RUSTSEC-2023-0066 to pleaser (#1799)
+  * Document the privilege-escalation vulnerability in pleaser. (#1798)
+  * Update webpki RUSTSEC-2023-0052 advisory. (#1797)
+  * Assigned RUSTSEC-2023-0065 to tungstenite (#1796)
+  * Create advisory for tungstenite DoS (#1795)
+
+-------------------------------------------------------------------

Old:
----
  advisory-db-20231007.tar.xz

New:
----
  advisory-db-20231027.tar.xz

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Other differences:
------------------
++++++ cargo-audit-advisory-db.spec ++++++
--- /var/tmp/diff_new_pack.ArxNQP/_old  2023-10-27 22:29:02.713389415 +0200
+++ /var/tmp/diff_new_pack.ArxNQP/_new  2023-10-27 22:29:02.713389415 +0200
@@ -17,7 +17,7 @@
 
 
 Name:           cargo-audit-advisory-db
-Version:        20231007
+Version:        20231027
 Release:        0
 Summary:        A database of known security issues for Rust depedencies
 License:        CC0-1.0

++++++ _service ++++++
--- /var/tmp/diff_new_pack.ArxNQP/_old  2023-10-27 22:29:02.745390588 +0200
+++ /var/tmp/diff_new_pack.ArxNQP/_new  2023-10-27 22:29:02.749390735 +0200
@@ -2,7 +2,7 @@
   <service mode="disabled" name="obs_scm">
     <param name="url">https://github.com/RustSec/advisory-db.git</param>
     <param name="scm">git</param>
-    <param name="version">20231007</param>
+    <param name="version">20231027</param>
     <param name="revision">main</param>
     <param name="changesgenerate">enable</param>
     <param name="changesauthor">[email protected]</param>

++++++ advisory-db-20231007.tar.xz -> advisory-db-20231027.tar.xz ++++++
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/advisory-db-20231007/.duplicate-id-guard 
new/advisory-db-20231027/.duplicate-id-guard
--- old/advisory-db-20231007/.duplicate-id-guard        2023-10-03 
15:53:18.000000000 +0200
+++ new/advisory-db-20231027/.duplicate-id-guard        2023-10-24 
03:38:27.000000000 +0200
@@ -1,3 +1,3 @@
 This file causes merge conflicts if two ID assignment jobs run concurrently.
 This prevents duplicate ID assignment due to a race between those jobs.
-36a9b51a48b3404a0625daab077982cb323512602246febf46ad480eee672625  -
+222dcb79d2f0a5d8698976c3b5c7852a0f117dfa2d390cb46677ccb3e7e8705a  -
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/advisory-db-20231007/crates/cocoon/RUSTSEC-2023-0068.md 
new/advisory-db-20231027/crates/cocoon/RUSTSEC-2023-0068.md
--- old/advisory-db-20231007/crates/cocoon/RUSTSEC-2023-0068.md 1970-01-01 
01:00:00.000000000 +0100
+++ new/advisory-db-20231027/crates/cocoon/RUSTSEC-2023-0068.md 2023-10-24 
03:38:27.000000000 +0200
@@ -0,0 +1,72 @@
+```toml
+[advisory]
+id = "RUSTSEC-2023-0068"
+package = "cocoon"
+date = "2023-10-15"
+url = "https://github.com/fadeevab/cocoon/issues/22";
+categories = ["crypto-failure"]
+cvss = "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N"
+keywords = ["nonce", "stream-cipher"]
+
+[affected.functions]
+"cocoon::Cocoon::encrypt" = ["<= 0.3.3"]
+"cocoon::Cocoon::dump" = ["<= 0.3.3"]
+"cocoon::Cocoon::wrap" = ["<= 0.3.3"]
+"cocoon::MiniCocoon::encrypt" = ["<= 0.3.3"]
+"cocoon::MiniCocoon::dump" = ["<= 0.3.3"]
+"cocoon::MiniCocoon::wrap" = ["<= 0.3.3"]
+
+[versions]
+patched = [">= 0.4.0"]
+```
+
+# Sequential calls of encryption API (`encrypt`, `wrap`, and `dump`) result in 
nonce reuse
+
+**Problem**: Trying to create a new encrypted message with the same cocoon
+object generates the same ciphertext. It mostly affects `MiniCocoon` and
+`Cocoon` objects with custom seeds and RNGs (where `StdRng` is used under
+the hood).
+
+**Note**: The issue does **NOT** affect objects created with **`Cocoon::new`**
+which utilizes `ThreadRng`.
+
+**Cause**: `StdRng` produces the same nonce because `StdRng::clone` resets its
+state.
+
+**Measure**: Make encryption API mutable (`encrypt`, `wrap`, and `dump`).
+
+**Workaround**: Create a new cocoon object with a new **seed** per each
+encryption.
+
+## How to Reproduce
+
+```rust
+let cocoon = MiniCocoon::from_password(b"password", &[1; 32]);
+let mut data1 = "my secret data".to_owned().into_bytes();
+let _ = cocoon.encrypt(&mut data1)?;
+
+let mut data2 = "my secret data".to_owned().into_bytes();
+let _ = cocoon.encrypt(&mut data2)?;
+
+// data1: [23, 217, 251, 151, 179, 62, 85, 15, 253, 92, 192, 112, 200, 52]
+// data2: [23, 217, 251, 151, 179, 62, 85, 15, 253, 92, 192, 112, 200, 52]
+```
+
+## Workaround
+
+For `cocoon <= 0.3.3`, create a new cocoon with a different **seed**
+per each `encrypt`/`wrap`/`dump` call.
+
+```rust
+let cocoon = MiniCocoon::from_password(b"password", &[1; 32]);
+let mut data1 = "my secret data".to_owned().into_bytes();
+let _ = cocoon.encrypt(&mut data1)?;
+
+// Another seed: &[2; 32].
+let cocoon = MiniCocoon::from_password(b"password", &[2; 32]);
+let mut data2 = "my secret data".to_owned().into_bytes();
+let _ = cocoon.encrypt(&mut data2)?;
+
+// data1: [23, 217, 251, 151, 179, 62, 85, 15, 253, 92, 192, 112, 200, 52]
+// data2: [53, 223, 209, 96, 130, 99, 209, 108, 83, 189, 123, 81, 19, 1]
+```
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/advisory-db-20231007/crates/fehler/RUSTSEC-2023-0067.md 
new/advisory-db-20231027/crates/fehler/RUSTSEC-2023-0067.md
--- old/advisory-db-20231007/crates/fehler/RUSTSEC-2023-0067.md 1970-01-01 
01:00:00.000000000 +0100
+++ new/advisory-db-20231027/crates/fehler/RUSTSEC-2023-0067.md 2023-10-24 
03:38:27.000000000 +0200
@@ -0,0 +1,16 @@
+```toml
+[advisory]
+id = "RUSTSEC-2023-0067"
+package = "fehler"
+date = "2023-10-12"
+url = "https://github.com/withoutboats/fehler/issues/66";
+informational = "unmaintained"
+
+[versions]
+patched = []
+
+```
+# `fehler` is unmaintained; use `culpa` instead
+
+The [`fehler`](https://crates.io/crates/fehler) crate is no longer maintained.
+Consider using [`culpa`](https://crates.io/crates/culpa) instead.
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/advisory-db-20231007/crates/owning_ref/RUSTSEC-2022-0040.md 
new/advisory-db-20231027/crates/owning_ref/RUSTSEC-2022-0040.md
--- old/advisory-db-20231007/crates/owning_ref/RUSTSEC-2022-0040.md     
2023-10-03 15:53:18.000000000 +0200
+++ new/advisory-db-20231027/crates/owning_ref/RUSTSEC-2022-0040.md     
2023-10-24 03:38:27.000000000 +0200
@@ -19,4 +19,5 @@
 - `OwningRefMut::as_owner` and `OwningRefMut::as_owner_mut` are 
[unsound](https://github.com/Kimundi/owning-ref-rs/issues/61) and may result in 
a use-after-free.
 - The crate [violates Rust's aliasing 
rules](https://github.com/Kimundi/owning-ref-rs/issues/49), which may cause 
miscompilations on recent compilers that emit the LLVM `noalias` attribute.
 
-No patched versions are available at this time. While a pull request with some 
fixes is outstanding, the maintainer appears to be unresponsive.
+`safer_owning_ref` is a replacement crate which fixes these issues.
+No patched versions of the original crate are available, and the maintainer is 
unresponsive.

Reply via email to