diff --git a/crates/portaudio-rs/RUSTSEC-0000-0000.toml b/crates/portaudio-rs/RUSTSEC-2019-0022.toml similarity index 79% rename from crates/portaudio-rs/RUSTSEC-0000-0000.toml rename to crates/portaudio-rs/RUSTSEC-2019-0022.toml index 688088c..5a77042 100644 --- a/crates/portaudio-rs/RUSTSEC-0000-0000.toml +++ b/crates/portaudio-rs/RUSTSEC-2019-0022.toml @@ -1,14 +1,8 @@ [advisory] -id = "RUSTSEC-0000-0000" - +id = "RUSTSEC-2019-0022" package = "portaudio-rs" - date = "2017-09-14" - -# Single-line description of a vulnerability (mandatory) title = "Stream callback function is not unwind safe" - -# Enter a short-form description of the vulnerability here (mandatory) description = """ Affected versions of this crate is not panic safe within callback functions `stream_callback` and `stream_finished_callback`. @@ -18,12 +12,7 @@ This allows an attacker to construct an arbitrary code execution . The flaw was reported by Phosphorus15. """ - -# yet not patched patched_versions = ["> 0.3.1"] - url = "https://github.com/mvdnes/portaudio-rs/issues/20" - categories = ["code-execution", "memory-corruption"] - keywords = ["audio", "ffi"]