Skip to content

Tags: jorgeantonio21/sui

Tags

sui_v1.21.0_1710550347_rel_notes

Toggle sui_v1.21.0_1710550347_rel_notes's commit message
docker: deterministic canary

sui_v1.21.0_1709662470_rel_notes

Toggle sui_v1.21.0_1709662470_rel_notes's commit message

Verified

This commit was created on GitHub.com and signed with GitHub’s verified signature.
update whoami for advisory (MystenLabs#16534)

## Description 

```
1380 │ whoami 1.3.0 registry+https://github.com/rust-lang/crates.io-index
     │ ------------------------------------------------------------------ security vulnerability detected
     │
     = ID: RUSTSEC-2024-0020
     = Advisory: https://rustsec.org/advisories/RUSTSEC-2024-0020
     = With older versions of the whoami crate, calling the `username` function leads to an immediate stack
       buffer overflow on illumos and Solaris. Denial of service and data corruption have both been
       observed in the wild, and the issue is possibly exploitable as well.

       This also affects any other Unix platforms that aren't any of: `linux`, `macos`, `freebsd`,
       `dragonfly`, `bitrig`, `openbsd`, `netbsd`.

       This issue has been addressed in whoami 1.5.0.

       For more information, see [this GitHub issue](ardaku/whoami#91).
     = Announcement: ardaku/whoami#91
     = Solution: Upgrade to >=1.5.0 (try `cargo update -p whoami`)
```
## Test Plan 

How did you test the new or updated feature?

---
If your changes are not user-facing and do not break anything, you can
skip the following section. Otherwise, please briefly describe what has
changed under the Release Notes section.

### Type of Change (Check all that apply)

- [ ] protocol change
- [ ] user-visible impact
- [ ] breaking change for a client SDKs
- [ ] breaking change for FNs (FN binary must upgrade)
- [ ] breaking change for validators or node operators (must upgrade
binaries)
- [ ] breaking change for on-chain data layout
- [ ] necessitate either a data wipe or data migration

### Release notes