mirror of
https://github.com/OMGeeky/advisory-db.git
synced 2026-01-20 02:21:00 +01:00
Revert "Add affected functions to legacy security warnings (#83)"
This reverts commit 0a981e2b6f.
These now need to use the new `affected_paths` attribute, which has a
different (VersionReq-bucketed) format.
This commit is contained in:
@@ -19,4 +19,3 @@ and possibly the execution of arbitrary code.
|
||||
This flaw was corrected by using checked arithmetic to calculate
|
||||
the size of the buffer.
|
||||
"""
|
||||
affected_functions = ["base64::encode_config","base64::encode_config_buf"]
|
||||
|
||||
@@ -14,4 +14,3 @@ is if an application constructs headers based on unsanitized user input.
|
||||
This issue was fixed by replacing all newline characters with a space during serialization of
|
||||
a header value.
|
||||
"""
|
||||
affected_functions = ["hyper::header::Headers::set"]
|
||||
|
||||
@@ -20,4 +20,3 @@ they will not be dropped more than once.
|
||||
|
||||
Thank you to @Vurich for reporting this bug.
|
||||
"""
|
||||
affected_functions = ["smallvec::SmallVec::insert_many"]
|
||||
|
||||
@@ -23,4 +23,3 @@ This has been fixed in https://github.com/alexcrichton/tar-rs/pull/156 and is
|
||||
published as `tar` 0.4.16. Thanks to Max Justicz for discovering this and
|
||||
emailing about the issue!
|
||||
"""
|
||||
affected_functions = ["tar::Entry::unpack_in"]
|
||||
|
||||
@@ -20,4 +20,3 @@ The error in untrusted is fixed in release 0.6.2 released 2018-06-21. It's also
|
||||
advisable that users of untrusted check for their sources for cases where errors
|
||||
returned by untrusted are not handled correctly.
|
||||
"""
|
||||
affected_functions = ["untrusted::Reader::skip_and_get_input"]
|
||||
|
||||
Reference in New Issue
Block a user