Translate database into V3 advisory format (#420)

As proposed in #240 and tracked in #414, this PR translates all
advisories into the new "V3" advisory format, which is based on Markdown
with leading TOML front matter.

This format makes it easier to see rendered Markdown syntax
descriptions, whether rendered by an IDE or GitHub. This should help
with both crafting advisories initially as well as review, and ideally
encourages more lengthy descriptions.

Support for this format shipped in `cargo-audit` v0.12.0 on
May 6th, 2020.
This commit is contained in:
Tony Arcieri
2020-10-01 18:29:11 -07:00
committed by GitHub
parent 2770460f9c
commit ac125ee29a
127 changed files with 1322 additions and 1090 deletions

View File

@@ -1,15 +1,10 @@
```toml
[advisory]
id = "CVE-2018-1000657"
package = "std"
date = "2018-08-20"
title = "Buffer overflow vulnerability in VecDeque::reserve()"
categories = ["code-execution", "denial-of-service"]
date = "2018-08-20"
url = "https://github.com/rust-lang/rust/issues/44800"
description = """
The `std::collections::vec_deque::VecDeque::reserve()` function contains a
buffer overflow vulnerability that can potentially result in arbitrary code
execution.
"""
[affected.functions]
"std::collections::vec_deque::VecDeque::reserve" = ["< 1.22.0, >= 1.3.0"]
@@ -17,3 +12,10 @@ execution.
[versions]
patched = [">= 1.22.0"]
unaffected = ["< 1.3.0"]
```
# Buffer overflow vulnerability in VecDeque::reserve()
The `std::collections::vec_deque::VecDeque::reserve()` function contains a
buffer overflow vulnerability that can potentially result in arbitrary code
execution.

View File

@@ -1,12 +1,22 @@
```toml
[advisory]
id = "CVE-2018-1000810"
package = "std"
date = "2018-09-21"
title = "Buffer overflow vulnerability in str::repeat()"
url = "https://groups.google.com/forum/#!topic/rustlang-security-announcements/CmSuTm-SaU0"
categories = ["denial-of-service", "memory-corruption"]
cvss = "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
description = """
date = "2018-09-21"
url = "https://groups.google.com/forum/#!topic/rustlang-security-announcements/CmSuTm-SaU0"
[affected.functions]
"std::str::repeat" = ["< 1.29.1, >= 1.26.0"]
[versions]
patched = [">= 1.29.1"]
unaffected = ["< 1.26.0"]
```
# Buffer overflow vulnerability in str::repeat()
The Rust team was recently notified of a security vulnerability affecting
the `str::repeat` function in the standard library. If your code does not
use this function, it is not affected.
@@ -93,11 +103,3 @@ accordance with our security policy https://www.rust-lang.org/security.html.
[3]: https://github.com/rust-lang/rust/pull/54397
[4]: https://github.com/rust-lang/rust/pull/54398
[5]: https://github.com/rust-lang/rust/pull/54399
"""
[affected.functions]
"std::str::repeat" = ["< 1.29.1, >= 1.26.0"]
[versions]
patched = [">= 1.29.1"]
unaffected = ["< 1.26.0"]

View File

@@ -1,11 +1,18 @@
```toml
[advisory]
id = "CVE-2019-12083"
package = "std"
date = "2019-05-13"
title = "Memory safety vulnerabilities arising from `Error::type_id`"
categories = ["memory-corruption"]
date = "2019-05-13"
url = "https://groups.google.com/forum/#!topic/rustlang-security-announcements/aZabeCMUv70"
description = """
[versions]
patched = ["> 1.34.1"]
unaffected = ["< 1.34.0"]
```
# Memory safety vulnerabilities arising from `Error::type_id`
The Rust team was recently notified of a security vulnerability affecting
manual implementations of `Error::type_id` and their interaction with the
`Error::downcast` family of functions in the standard library. If your code
@@ -91,8 +98,3 @@ with our security policy https://www.rust-lang.org/policies/security.
[3]: https://github.com/rust-lang/rust/pull/60785
[4]: https://github.com/rust-lang/rust/pull/60786
[5]: https://github.com/rust-lang/rust/pull/60787
"""
[versions]
patched = ["> 1.34.1"]
unaffected = ["< 1.34.0"]