mirror of
https://github.com/OMGeeky/advisory-db.git
synced 2026-01-03 01:56:41 +01:00
Add affected functions to legacy security warnings (#83)
Add affected functions to advisories Add `affected_functions` to: - RUSTSEC-2018-0003 - RUSTSEC-2017-0002 - RUSTSEC-2018-0002 - RUSTSEC-2018-0001 - RUSTSEC-2017-0004
This commit is contained in:
committed by
Tony Arcieri
parent
4be9cb6f15
commit
0a981e2b6f
@@ -19,3 +19,4 @@ and possibly the execution of arbitrary code.
|
||||
This flaw was corrected by using checked arithmetic to calculate
|
||||
the size of the buffer.
|
||||
"""
|
||||
affected_functions = ["base64::encode_config","base64::encode_config_buf"]
|
||||
|
||||
@@ -14,3 +14,4 @@ is if an application constructs headers based on unsanitized user input.
|
||||
This issue was fixed by replacing all newline characters with a space during serialization of
|
||||
a header value.
|
||||
"""
|
||||
affected_functions = ["hyper::header::Headers::set"]
|
||||
|
||||
@@ -20,3 +20,4 @@ they will not be dropped more than once.
|
||||
|
||||
Thank you to @Vurich for reporting this bug.
|
||||
"""
|
||||
affected_functions = ["smallvec::SmallVec::insert_many"]
|
||||
|
||||
@@ -23,3 +23,4 @@ This has been fixed in https://github.com/alexcrichton/tar-rs/pull/156 and is
|
||||
published as `tar` 0.4.16. Thanks to Max Justicz for discovering this and
|
||||
emailing about the issue!
|
||||
"""
|
||||
affected_functions = ["tar::Entry::unpack_in"]
|
||||
|
||||
@@ -20,3 +20,4 @@ The error in untrusted is fixed in release 0.6.2 released 2018-06-21. It's also
|
||||
advisable that users of untrusted check for their sources for cases where errors
|
||||
returned by untrusted are not handled correctly.
|
||||
"""
|
||||
affected_functions = ["untrusted::Reader::skip_and_get_input"]
|
||||
|
||||
Reference in New Issue
Block a user