diff --git a/crates/string-interner/RUSTSEC-2019-0023.toml b/crates/string-interner/RUSTSEC-2019-0023.toml index b4b16e1..3530498 100644 --- a/crates/string-interner/RUSTSEC-2019-0023.toml +++ b/crates/string-interner/RUSTSEC-2019-0023.toml @@ -14,7 +14,10 @@ An attacker can do brute force attack to get the data pointed by the dangling po The flaw was corrected by . This patch implements `Clone` manually to the interner type, so that the internal raw pointers always point the strings owned by the same interner. + +PR #10 was also backported to the 0.6 release line in + and was released in 0.6.4. """ -patched_versions = [">= 0.7.1"] +patched_versions = ["^0.6.4", ">= 0.7.1"] url = "https://github.com/Robbepop/string-interner/issues/9" keywords = ["use after free"]