Fix all advisories to pass linter

Mostly related to the `affected_functions` field, which has changed a
few times.
This commit is contained in:
Tony Arcieri
2019-09-09 12:19:01 -07:00
parent 74ebe212dc
commit 01ac6725d5
19 changed files with 80 additions and 76 deletions

View File

@@ -1,12 +1,8 @@
[advisory]
id = "RUSTSEC-2019-0008"
package = "simd-json"
date = "2019-06-24"
title = "Flaw in string parsing can lead to crashes due to invalid memory access."
description = """
The affected version of this crate did not guard against accessing memory
beyond the range of its input data. A pointer cast to read the data into
@@ -22,17 +18,14 @@ segflt | [ 32 | byte ] |
```
This allows an attacker to eventually crash a service.
The flaw was corrected by using a padding buffer for the last read from the
input. So that we are we never read over the boundary of the input data.
"""
patched_versions = [">= 0.1.15"]
unaffected_versions = ["<= 0.1.13"]
url = "https://github.com/Licenser/simdjson-rs/pull/27"
keywords = ["simd"]
affected_arch = ["x86", "x86_64"]
[affected]
arch = ["x86", "x86_64"]