mirror of
https://github.com/OMGeeky/advisory-db.git
synced 2026-01-07 12:11:29 +01:00
Translate database into V3 advisory format (#420)
As proposed in #240 and tracked in #414, this PR translates all advisories into the new "V3" advisory format, which is based on Markdown with leading TOML front matter. This format makes it easier to see rendered Markdown syntax descriptions, whether rendered by an IDE or GitHub. This should help with both crafting advisories initially as well as review, and ideally encourages more lengthy descriptions. Support for this format shipped in `cargo-audit` v0.12.0 on May 6th, 2020.
This commit is contained in:
@@ -1,15 +1,10 @@
|
||||
```toml
|
||||
[advisory]
|
||||
id = "CVE-2018-1000657"
|
||||
package = "std"
|
||||
date = "2018-08-20"
|
||||
title = "Buffer overflow vulnerability in VecDeque::reserve()"
|
||||
categories = ["code-execution", "denial-of-service"]
|
||||
date = "2018-08-20"
|
||||
url = "https://github.com/rust-lang/rust/issues/44800"
|
||||
description = """
|
||||
The `std::collections::vec_deque::VecDeque::reserve()` function contains a
|
||||
buffer overflow vulnerability that can potentially result in arbitrary code
|
||||
execution.
|
||||
"""
|
||||
|
||||
[affected.functions]
|
||||
"std::collections::vec_deque::VecDeque::reserve" = ["< 1.22.0, >= 1.3.0"]
|
||||
@@ -17,3 +12,10 @@ execution.
|
||||
[versions]
|
||||
patched = [">= 1.22.0"]
|
||||
unaffected = ["< 1.3.0"]
|
||||
```
|
||||
|
||||
# Buffer overflow vulnerability in VecDeque::reserve()
|
||||
|
||||
The `std::collections::vec_deque::VecDeque::reserve()` function contains a
|
||||
buffer overflow vulnerability that can potentially result in arbitrary code
|
||||
execution.
|
||||
@@ -1,12 +1,22 @@
|
||||
```toml
|
||||
[advisory]
|
||||
id = "CVE-2018-1000810"
|
||||
package = "std"
|
||||
date = "2018-09-21"
|
||||
title = "Buffer overflow vulnerability in str::repeat()"
|
||||
url = "https://groups.google.com/forum/#!topic/rustlang-security-announcements/CmSuTm-SaU0"
|
||||
categories = ["denial-of-service", "memory-corruption"]
|
||||
cvss = "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
|
||||
description = """
|
||||
date = "2018-09-21"
|
||||
url = "https://groups.google.com/forum/#!topic/rustlang-security-announcements/CmSuTm-SaU0"
|
||||
|
||||
[affected.functions]
|
||||
"std::str::repeat" = ["< 1.29.1, >= 1.26.0"]
|
||||
|
||||
[versions]
|
||||
patched = [">= 1.29.1"]
|
||||
unaffected = ["< 1.26.0"]
|
||||
```
|
||||
|
||||
# Buffer overflow vulnerability in str::repeat()
|
||||
|
||||
The Rust team was recently notified of a security vulnerability affecting
|
||||
the `str::repeat` function in the standard library. If your code does not
|
||||
use this function, it is not affected.
|
||||
@@ -93,11 +103,3 @@ accordance with our security policy https://www.rust-lang.org/security.html.
|
||||
[3]: https://github.com/rust-lang/rust/pull/54397
|
||||
[4]: https://github.com/rust-lang/rust/pull/54398
|
||||
[5]: https://github.com/rust-lang/rust/pull/54399
|
||||
"""
|
||||
|
||||
[affected.functions]
|
||||
"std::str::repeat" = ["< 1.29.1, >= 1.26.0"]
|
||||
|
||||
[versions]
|
||||
patched = [">= 1.29.1"]
|
||||
unaffected = ["< 1.26.0"]
|
||||
@@ -1,11 +1,18 @@
|
||||
```toml
|
||||
[advisory]
|
||||
id = "CVE-2019-12083"
|
||||
package = "std"
|
||||
date = "2019-05-13"
|
||||
title = "Memory safety vulnerabilities arising from `Error::type_id`"
|
||||
categories = ["memory-corruption"]
|
||||
date = "2019-05-13"
|
||||
url = "https://groups.google.com/forum/#!topic/rustlang-security-announcements/aZabeCMUv70"
|
||||
description = """
|
||||
|
||||
[versions]
|
||||
patched = ["> 1.34.1"]
|
||||
unaffected = ["< 1.34.0"]
|
||||
```
|
||||
|
||||
# Memory safety vulnerabilities arising from `Error::type_id`
|
||||
|
||||
The Rust team was recently notified of a security vulnerability affecting
|
||||
manual implementations of `Error::type_id` and their interaction with the
|
||||
`Error::downcast` family of functions in the standard library. If your code
|
||||
@@ -91,8 +98,3 @@ with our security policy https://www.rust-lang.org/policies/security.
|
||||
[3]: https://github.com/rust-lang/rust/pull/60785
|
||||
[4]: https://github.com/rust-lang/rust/pull/60786
|
||||
[5]: https://github.com/rust-lang/rust/pull/60787
|
||||
"""
|
||||
|
||||
[versions]
|
||||
patched = ["> 1.34.1"]
|
||||
unaffected = ["< 1.34.0"]
|
||||
Reference in New Issue
Block a user