Bug ID | 1188022 |
---|---|
Summary | mozilla:Factory/mozjs78: cargo audit, may need to update and re-vendor |
Classification | openSUSE |
Product | openSUSE.org |
Version | unspecified |
Hardware | Other |
OS | Other |
Status | NEW |
Severity | Normal |
Priority | P5 - None |
Component | 3rd party software |
Assignee | wolfgang@rosenauer.org |
Reporter | william.brown@suse.com |
QA Contact | screening-team-bugs@suse.de |
Found By | --- |
Blocker | --- |
Hi there, I've recently started a project to scan rust projects with cargo-audit for potential known security issues. The following was found in mozjs78: * RUSTSEC-2021-0067 -> crate: cranelift-codegen, cvss: None, class: ['code-execution', 'memory-corruption', 'memory-exposure'] * RUSTSEC-2020-0060 -> crate: futures-task, cvss: None, class: ['code-execution', 'memory-corruption'] * RUSTSEC-2020-0061 -> crate: futures-task, cvss: None, class: ['denial-of-service'] * RUSTSEC-2020-0059 -> crate: futures-util, cvss: None, class: ['thread-safety'] * RUSTSEC-2020-0146 -> crate: generic-array, cvss: None, class: ['memory-corruption'] * RUSTSEC-2021-0020 -> crate: hyper, cvss: None, class: ['format-injection'] * RUSTSEC-2020-0004 -> crate: lucet-runtime-internals, cvss: None, class: ['memory-corruption', 'memory-exposure'] * RUSTSEC-2020-0082 -> crate: ordered-float, cvss: None, class: [] * RUSTSEC-2021-0013 -> crate: raw-cpuid, cvss: None, class: ['memory-corruption', 'denial-of-service'] * RUSTSEC-2021-0003 -> crate: smallvec, cvss: None, class: ['memory-corruption'] * RUSTSEC-2020-0043 -> crate: ws, cvss: None, class: ['denial-of-service'] Most of these should be able to be resolved with "cargo update" and re-vendoring your vendor.tar. Alternately upstream may have released updates to their Cargo.toml/Cargo.lock that may resolve these on an update. It would be great if you could have a look at these!