Integer overflow in layout.c++ in Sandstorm Cap'n Proto before 0.4.1.1 and 0.5.x before 0.5.1.1 allows remote peers to cause a denial of service or possibly obtain sensitive information from memory via a crafted message, related to pointer validation.
{ "binaries": [ { "binary_version": "0.4.0-1ubuntu2.1", "binary_name": "capnproto" }, { "binary_version": "0.4.0-1ubuntu2.1", "binary_name": "capnproto-dbgsym" }, { "binary_version": "0.4.0-1ubuntu2.1", "binary_name": "libcapnp-0.4.0" }, { "binary_version": "0.4.0-1ubuntu2.1", "binary_name": "libcapnp-0.4.0-dbgsym" }, { "binary_version": "0.4.0-1ubuntu2.1", "binary_name": "libcapnp-dev" } ], "availability": "No subscription required" }
{ "binaries": [ { "binary_version": "0.5.3-2ubuntu1", "binary_name": "capnproto" }, { "binary_version": "0.5.3-2ubuntu1", "binary_name": "capnproto-dbgsym" }, { "binary_version": "0.5.3-2ubuntu1", "binary_name": "libcapnp-0.5.3" }, { "binary_version": "0.5.3-2ubuntu1", "binary_name": "libcapnp-0.5.3-dbgsym" }, { "binary_version": "0.5.3-2ubuntu1", "binary_name": "libcapnp-dev" } ], "availability": "No subscription required" }