From 16a2f4c592ca6732946b615b740509c3c066b4cc Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Eduardo=20S=C3=A1nchez=20Mu=C3=B1oz?= Date: Fri, 24 Apr 2020 00:23:27 +0200 Subject: [PATCH] Add advisory for os_str_bytes --- crates/os_str_bytes/RUSTSEC-0000-0000.toml | 21 +++++++++++++++++++++ 1 file changed, 21 insertions(+) create mode 100644 crates/os_str_bytes/RUSTSEC-0000-0000.toml diff --git a/crates/os_str_bytes/RUSTSEC-0000-0000.toml b/crates/os_str_bytes/RUSTSEC-0000-0000.toml new file mode 100644 index 0000000..9629e39 --- /dev/null +++ b/crates/os_str_bytes/RUSTSEC-0000-0000.toml @@ -0,0 +1,21 @@ +[advisory] +id = "RUSTSEC-0000-0000" +package = "os_str_bytes" +date = "2020-04-24" +title = "Relies on undefined behavior of `char::from_u32_unchecked`" +url = "https://github.com/dylni/os_str_bytes/pull/1" +description = """ +The Windows implementation of this crate relied on the behavior of +`std::char::from_u32_unchecked` when its safety clause is violated. +Even though this worked with Rust versions up to 1.42 (at least), +that behavior could change with any new Rust version, possibly leading +a security issue. + +The flaw was corrected in version 2.0.0. +""" + +[affected] +os = ["windows"] + +[versions] +patched = [">= 2.0.0"]