From abdfc42feae538263f2da398e757a602c20124b3 Mon Sep 17 00:00:00 2001 From: Ken Reed Date: Tue, 6 Apr 2021 09:43:11 -0400 Subject: [PATCH] Added patch to "fix" vulnerability. (#866) * patch note * added patch version --- crates/reorder/RUSTSEC-2021-0050.md | 10 +++++++++- 1 file changed, 9 insertions(+), 1 deletion(-) diff --git a/crates/reorder/RUSTSEC-2021-0050.md b/crates/reorder/RUSTSEC-2021-0050.md index 8036bf1..55d4f70 100644 --- a/crates/reorder/RUSTSEC-2021-0050.md +++ b/crates/reorder/RUSTSEC-2021-0050.md @@ -7,7 +7,7 @@ url = "https://github.com/tiby312/reorder/issues/1" keywords = ["memory-corruption", "out-of-bounds"] [versions] -patched = [] +patched = [">= 1.1.0"] ``` # swap_index can write out of bounds and return uninitialized memory @@ -26,3 +26,11 @@ As noted by the Rust documentation, [`len()`](https://doc.rust-lang.org/std/iter and `size_hint()` are primarily meant for optimization and incorrect values from their implementations should not lead to memory safety violations. + +# Patch + +A new version crate was pushed that marks this function as unsafe. + +reorder = "1.1.0" + +Previous versions have also been yanked from crates.io.