In Halibut versions prior to 4.4.7 there is a deserialisation vulnerability that could allow remote code execution on systems that already trust each other based on certificate verification. Advisory: https://advisories.octopus.com/adv/2021-08---Remote-Code-Execution-via-Deserialisation-in-the-Halibut-Protocol-(CVE-2021-31819).2250309681.html
Created halibut tracking bugs for this issue: Affects: epel-all [bug 2009436] Affects: fedora-all [bug 2009435]
This CVE Bugzilla entry is for community support informational purposes only as it does not affect a package in a commercially supported Red Hat product. Refer to the dependent bugs for status of those individual community products.
(In reply to Marian Rehak from comment #1) > Created halibut tracking bugs for this issue: > > Affects: epel-all [bug 2009436] > Affects: fedora-all [bug 2009435] I am afraid you confused projects. AFAIK the CVE is in the https://www.nuget.org/packages/Halibut/ which is a secure, RPC-based communication framework, but you opened bugs against https://www.chiark.greenend.org.uk/~sgtatham/halibut/, which is a documentation production system, with elements similar to TeX, debiandoc-sgml, TeXinfo, and others. It is primarily targeted at people producing software manuals. I.e. it seems there is nothing to fix at my side.