Nixpkgs Security Tracker

Login with GitHub

Suggestions search

With package: capnproto

Found 2 matching suggestions

Published
updated 9 hours ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed
    2 packages
    • capnproto-java
    • capnproto-rust
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
Cap'n Proto has an integer overflow in KJ-HTTP

Cap'n Proto is a data interchange format and capability-based RPC system. Prior to 1.4.0, a negative Content-Length value was converted to unsigned, treating it as an impossibly large length instead. In theory, this bug could enable HTTP request/response smuggling. This vulnerability is fixed in 1.4.0.

Affected products

capnproto
  • ==< 1.4.0

Matching in nixpkgs

Ignored packages (2)

Package maintainers

Upstream advisory: https://github.com/capnproto/capnproto/security/advisories/GHSA-qjx3-pp3m-9jpm
Published
updated 9 hours ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed
    2 packages
    • capnproto-java
    • capnproto-rust
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
Cap'n Proto: Integer overflow in KJ-HTTP chunk size

Cap'n Proto is a data interchange format and capability-based RPC system. Prior to 1.4.0, when using Transfer-Encoding: chunked, if a chunk's size parsed to a value of 2^64 or larger, it would be truncated to a 64-bit integer. In theory, this bug could enable HTTP request/response smuggling. This vulnerability is fixed in 1.4.0.

Affected products

capnproto
  • ==< 1.4.0

Matching in nixpkgs

Ignored packages (2)

Package maintainers

Upstream advisory: https://github.com/capnproto/capnproto/security/advisories/GHSA-vpcq-mx5v-32wm