Fedora Linux 8783 Published by

A libsignal-protocol security update has been released for Fedora 37.



SECURITY: Fedora 37 Update: libsignal-protocol-c-2.3.3-8.fc37


--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2023-6cfe134db6
2023-04-29 04:41:45.954640
--------------------------------------------------------------------------------

Name : libsignal-protocol-c
Product : Fedora 37
Version : 2.3.3
Release : 8.fc37
URL :   https://github.com/signalapp/libsignal-protocol-c
Summary : Signal Protocol C library
Description :
This is a ratcheting forward secrecy protocol that works in synchronous
and asynchronous messaging environments.

--------------------------------------------------------------------------------
Update Information:

Backport a fix for [CVE-2022-48468](  https://cve.mitre.org/cgi-
bin/cvename.cgi?name=CVE-2022-48468) for
[protobuf-c](  https://github.com/protobuf-c/protobuf-c), which is bundled in
`libsignal-protocol-c`.   https://github.com/protobuf-c/protobuf-
c/commit/ec3d900001a13ccdaa8aef996b34c61159c76217
  https://github.com/protobuf-c/protobuf-c/issues/499
  https://github.com/protobuf-c/protobuf-c/pull/513
  https://github.com/protobuf-c/protobuf-c/releases/tag/v1.4.1
--------------------------------------------------------------------------------
ChangeLog:

* Wed Apr 19 2023 Randy Barlow - 2.3.3-8
- Fix CVE-2022-48468: unsigned integer overflow (#2186673).
--------------------------------------------------------------------------------
References:

[ 1 ] Bug #2186674 - CVE-2022-48468 libsignal-protocol-c: protobuf-c: an unsigned integer overflow in parse_required_member [epel-8]
  https://bugzilla.redhat.com/show_bug.cgi?id=2186674
[ 2 ] Bug #2186675 - CVE-2022-48468 libsignal-protocol-c: protobuf-c: an unsigned integer overflow in parse_required_member [fedora-36]
  https://bugzilla.redhat.com/show_bug.cgi?id=2186675
--------------------------------------------------------------------------------

This update can be installed with the "dnf" update program. Use
su -c 'dnf upgrade --advisory FEDORA-2023-6cfe134db6' at the command
line. For more information, refer to the dnf documentation available at
  http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
  https://fedoraproject.org/keys
--------------------------------------------------------------------------------
_______________________________________________