annotate src/capnproto-git-20161025/doc/_posts/2015-03-05-another-cpu-amplification.md @ 83:ae30d91d2ffe

Replace these with versions built using an older toolset (so as to avoid ABI compatibilities when linking on Ubuntu 14.04 for packaging purposes)
author Chris Cannam
date Fri, 07 Feb 2020 11:51:13 +0000
parents 9530b331f8c1
children
rev   line source
cannam@48 1 ---
cannam@48 2 layout: post
cannam@48 3 title: "Another security advisory -- Additional CPU amplification case"
cannam@48 4 author: kentonv
cannam@48 5 ---
cannam@48 6
cannam@48 7 Unfortunately, it turns out that our fix for one of [the security advisories issued on Monday](2015-03-02-security-advisory-and-integer-overflow-protection.html) was not complete.
cannam@48 8
cannam@48 9 Fortunately, the incomplete fix is for the non-critical vulnerability. The worst case is that an attacker could consume excessive CPU time.
cannam@48 10
cannam@48 11 Nevertheless, we've issued [a new advisory](https://github.com/sandstorm-io/capnproto/tree/master/security-advisories/2015-03-05-0-c++-addl-cpu-amplification.md) and pushed a new release:
cannam@48 12
cannam@48 13 - Release 0.5.1.2: [source](https://capnproto.org/capnproto-c++-0.5.1.2.tar.gz), [win32](https://capnproto.org/capnproto-c++-win32-0.5.1.2.zip)
cannam@48 14 - Release 0.4.1.2: [source](https://capnproto.org/capnproto-c++-0.4.1.2.tar.gz)
cannam@48 15
cannam@48 16 Sorry for the rapid repeated releases, but we don't like sitting on security bugs.