Revert "Add affected functions to legacy security warnings (#83)"

This reverts commit 0a981e2b6f.

These now need to use the new `affected_paths` attribute, which has a
different (VersionReq-bucketed) format.
This commit is contained in:
Tony Arcieri
2019-01-13 17:31:25 -08:00
parent 59ea63710e
commit 782efebde9
5 changed files with 0 additions and 5 deletions

View File

@@ -19,4 +19,3 @@ and possibly the execution of arbitrary code.
This flaw was corrected by using checked arithmetic to calculate
the size of the buffer.
"""
affected_functions = ["base64::encode_config","base64::encode_config_buf"]

View File

@@ -14,4 +14,3 @@ is if an application constructs headers based on unsanitized user input.
This issue was fixed by replacing all newline characters with a space during serialization of
a header value.
"""
affected_functions = ["hyper::header::Headers::set"]

View File

@@ -20,4 +20,3 @@ they will not be dropped more than once.
Thank you to @Vurich for reporting this bug.
"""
affected_functions = ["smallvec::SmallVec::insert_many"]

View File

@@ -23,4 +23,3 @@ This has been fixed in https://github.com/alexcrichton/tar-rs/pull/156 and is
published as `tar` 0.4.16. Thanks to Max Justicz for discovering this and
emailing about the issue!
"""
affected_functions = ["tar::Entry::unpack_in"]

View File

@@ -20,4 +20,3 @@ The error in untrusted is fixed in release 0.6.2 released 2018-06-21. It's also
advisable that users of untrusted check for their sources for cases where errors
returned by untrusted are not handled correctly.
"""
affected_functions = ["untrusted::Reader::skip_and_get_input"]