github-actions[bot]
36df8a4efc
Assigned RUSTSEC-2022-0034 to pkcs11 ( #1283 )
...
Co-authored-by: tarcieri <tarcieri@users.noreply.github.com >
2022-07-25 11:19:15 -06:00
Ionuț Mihalcea
48214447df
Add advisory for pkcs11 ( #1282 )
...
Signed-off-by: Ionut Mihalcea <ionut.mihalcea@arm.com >
2022-07-23 08:29:34 -06:00
github-actions[bot]
2718c2db84
Assigned RUSTSEC-2022-0033 to openssl-src ( #1279 )
...
Co-authored-by: Shnatsel <Shnatsel@users.noreply.github.com >
2022-07-05 14:48:56 +02:00
Alexis Mousset
d820cf991c
Add advisory for openssl CVE-2022-2274 ( #1276 )
2022-07-05 14:44:40 +02:00
github-actions[bot]
1c17612a36
Assigned RUSTSEC-2022-0032 to openssl-src ( #1278 )
...
Co-authored-by: Shnatsel <Shnatsel@users.noreply.github.com >
2022-07-05 14:44:23 +02:00
Alexis Mousset
6f8de93f84
Add advisory for openssl CVE-2022-2097 ( #1277 )
2022-07-05 14:33:40 +02:00
github-actions[bot]
b4ed922847
Assigned RUSTSEC-2022-0031 to rulex ( #1274 )
...
Co-authored-by: Shnatsel <Shnatsel@users.noreply.github.com >
2022-06-26 22:01:26 +02:00
Evan Richter
d0e82ff0d7
rulex advisory for string indexing panic ( #1272 )
2022-06-26 21:48:57 +02:00
github-actions[bot]
03ab8e5349
Assigned RUSTSEC-2022-0030 to rulex ( #1273 )
...
Co-authored-by: Shnatsel <Shnatsel@users.noreply.github.com >
2022-06-26 21:44:13 +02:00
Evan Richter
c188be71e2
rulex advisory for stack overflow ( #1271 )
2022-06-26 21:42:00 +02:00
8573
7381319981
Copyedit RUSTSEC-2021-0122 ( #1269 )
...
Apply some copyedits to the text introduced by #1268 . Add a missing
comma; inflect "be" better; and use normal quotation marks rather than
backticks around the word "safe", referring to Safe Rust, as, unlike
`unsafe`, "safe" is not Rust syntax.
2022-06-25 14:06:03 +02:00
Andrew Lamb
9e0c88bd78
Clarify flatbuffers RUSTSEC-2021-0122.md ( #1268 )
...
It may be hard for non Rust experts to understand what the implications of "is `unsafe` but not marked as such" means
I propose adding some more supporting information
2022-06-24 16:17:18 +02:00
Sergey "Shnatsel" Davidoff
49fb6c0b94
Revert "Fix RUSTSEC-2022-0025,26,27 openssl-src for the 111 stream ( #1263 )" ( #1264 )
...
This reverts commit 7cbdcd8500 .
2022-06-20 14:19:49 +02:00
pinkforest(she/her)
7cbdcd8500
Fix RUSTSEC-2022-0025,26,27 openssl-src for the 111 stream ( #1263 )
...
* Fix advisory openssl-src 111 stream patched
* not a semver
* make 111 affected
2022-06-17 13:15:51 +02:00
github-actions[bot]
f10f232879
Assigned RUSTSEC-2022-0029 to crossbeam ( #1261 )
...
Co-authored-by: Shnatsel <Shnatsel@users.noreply.github.com >
2022-06-08 01:12:13 +02:00
Sergey "Shnatsel" Davidoff
e8ef9ea980
Add patched version to im RUSTSEC-2020-0096 ( #1259 )
2022-06-08 01:10:26 +02:00
Ben Kimock
6a769d1d24
Report data race/memory corruption in crossbeam 0.2 ( #1260 )
2022-06-08 01:10:09 +02:00
Tony Arcieri
f79eb4bad9
Revert "Withdraw RUSTSEC-2020-0071: Potential segfault in the time crate ( #1242 )" ( #1258 )
...
This reverts commit a47cd63007 .
The advisory was withdrawn based on discussions around whether read-only
environment variable access constitutes a vulnerability.
However, per the `time` crate's author @jhpratt, the crate also modifies
the environment and therefore the advisory should *not* be withdrawn:
https://github.com/rustsec/advisory-db/pull/1242#issuecomment-1144903688
2022-06-02 08:37:44 -06:00
github-actions[bot]
29281434b7
Assigned RUSTSEC-2022-0028 to neon ( #1257 )
...
Co-authored-by: alex <alex@users.noreply.github.com >
2022-05-23 16:11:11 -04:00
K.J. Valencik
b3bf55706f
Use after free in Neon externally allocated JavaScript buffers ( #1256 )
2022-05-23 16:05:22 -04:00
Tony Arcieri
ef71758448
README.md: maintained as of Q2 2022
2022-05-23 08:11:59 -06:00
Tony Arcieri
c1d94fd681
Bump rustsec-admin to v0.7.0 ( #1255 )
...
Release notes: https://github.com/rustsec/rustsec/pull/575
2022-05-23 07:50:54 -06:00
Ralf Jung
b4d8786707
fix hyper patched version number ( #1250 )
2022-05-20 13:16:20 +02:00
Alexis Mousset
0abe74330b
Fix category of RUSTSEC-2022-0025 ( #1249 )
2022-05-19 22:32:59 +02:00
github-actions[bot]
bdc5813f40
Assigned RUSTSEC-2022-0027 to openssl-src ( #1248 )
...
Co-authored-by: Shnatsel <Shnatsel@users.noreply.github.com >
2022-05-19 19:41:25 +02:00
Alexis Mousset
c9177664c2
Add advisory for openssl CVE-2022-1343 ( #1243 )
2022-05-19 19:39:38 +02:00
github-actions[bot]
52b29cd771
Assigned RUSTSEC-2022-0026 to openssl-src ( #1247 )
...
Co-authored-by: Shnatsel <Shnatsel@users.noreply.github.com >
2022-05-19 19:39:22 +02:00
Alexis Mousset
999edf8809
Add advisory for openssl CVE-2022-1434 ( #1244 )
2022-05-19 19:37:32 +02:00
github-actions[bot]
4e24c897b5
Assigned RUSTSEC-2022-0025 to openssl-src ( #1246 )
...
Co-authored-by: Shnatsel <Shnatsel@users.noreply.github.com >
2022-05-19 19:37:21 +02:00
Alexis Mousset
e1e8e92e89
Add advisory for openssl CVE-2022-1473 ( #1245 )
2022-05-19 19:35:53 +02:00
David Knaack
a47cd63007
Withdraw RUSTSEC-2020-0071: Potential segfault in the time crate ( #1242 )
2022-05-13 12:27:52 -06:00
Tony Arcieri
ca1383b258
Withdraw RUSTSEC-2020-0159: unsound localtime_r call in chrono ( #1241 )
...
Per rustsec/advisory-db#1190 , it would be good to move to a policy where
we don't file advisories against crates which perform unsynchronized
reads from the process environment, and instead focus only on crates
which modify the process environment in an unsynchronized manner.
2022-05-12 09:45:54 -06:00
github-actions[bot]
ba96a13792
Assigned RUSTSEC-2022-0024 to double-checked-cell ( #1240 )
...
Co-authored-by: Shnatsel <Shnatsel@users.noreply.github.com >
2022-05-11 23:13:02 +02:00
Niklas Fiekas
0653c8f324
Self-report double-checked-cell as unmaintained ( #1239 )
2022-05-11 23:05:53 +02:00
github-actions[bot]
7b009b96f7
Assigned RUSTSEC-2022-0023 to static_type_map ( #1238 )
...
Co-authored-by: Shnatsel <Shnatsel@users.noreply.github.com >
2022-05-11 21:44:11 +02:00
Malobre
30e1ac3cd5
Create RUSTSEC-0000-0000.md ( #1236 )
2022-05-11 21:41:08 +02:00
github-actions[bot]
eb8c788bc0
Assigned RUSTSEC-2022-0022 to hyper ( #1235 )
...
Co-authored-by: Shnatsel <Shnatsel@users.noreply.github.com >
2022-05-10 20:45:40 +02:00
Ralf Jung
6b7b129aef
add hyper advisory ( #1232 )
2022-05-10 20:42:51 +02:00
github-actions[bot]
e78650dfe3
Assigned RUSTSEC-2022-0019 to crossbeam-channel, RUSTSEC-2022-0020 to crossbeam, RUSTSEC-2022-0021 to crossbeam-queue ( #1233 )
...
Co-authored-by: Shnatsel <Shnatsel@users.noreply.github.com >
2022-05-10 17:20:48 +02:00
Ralf Jung
bf2e0598f5
add crossbeam advisories for incorrect (unsound) zeroed memory ( #1231 )
...
* add crossbeam queue advisory
* also add crossbeam-channel issue
2022-05-10 17:04:04 +02:00
github-actions[bot]
7975ad680c
Assigned RUSTSEC-2022-0018 to totp-rs ( #1230 )
...
Co-authored-by: Shnatsel <Shnatsel@users.noreply.github.com >
2022-05-09 20:08:13 +02:00
Cléo Rebert
fa5b6696cf
Possible timing attack in totp-rs ( #1229 )
...
* Create RUSTSEC-0000-0000.md
* Fix [affected.functions]
2022-05-09 20:03:01 +02:00
Tony Arcieri
2875efb2f1
HOWTO_UNMAINTAINED.md: guide for unmaintained crate advisories ( #1192 )
...
Initial guide on policy around what RustSec considers to be an
unmaintained crate as well as the policy for filing an advisory
2022-05-01 14:16:16 -06:00
github-actions[bot]
83c13d8c0a
Assigned RUSTSEC-2022-0017 to array-macro ( #1225 )
...
Co-authored-by: Shnatsel <Shnatsel@users.noreply.github.com >
2022-04-27 21:05:18 +02:00
Konrad Borowski
c29b239a56
Add advisory for using impure constants in array-macro ( #1224 )
2022-04-27 19:55:44 +02:00
dylni
b2ba503c74
Add patch version for fruity ( #1223 )
2022-04-19 02:03:30 +02:00
Sergey "Shnatsel" Davidoff
00a1687a13
Update RUSTSEC-2020-0071.md ( #1222 )
2022-04-18 03:32:20 +02:00
Nikhil Benesch
ce150ef8cb
RUSTSEC-2022-0012: note that v0.10.0+ is patched ( #1220 )
...
As far as I can tell, v0.10.0+ was not affected by this bug [0]. The commit which
fixes the unsoundness landed in main before v0.10.0 was released.
[0]: 9d4342c5ff
2022-04-05 17:24:42 +02:00
github-actions[bot]
fdc6858e60
Assigned RUSTSEC-2022-0016 to wasmtime ( #1218 )
...
Co-authored-by: alex <alex@users.noreply.github.com >
2022-03-31 18:54:54 -04:00
Nick Fitzgerald
e6248efe2a
Add CVE-2022-24791 for Wasmtime ( #1217 )
...
* Add CVE-2022-24791 for Wasmtime
* Update CVE-2022-24791
* Update crates/wasmtime/RUSTSEC-0000-0000.md
Co-authored-by: Alex Gaynor <alex.gaynor@gmail.com >
Co-authored-by: Alex Gaynor <alex.gaynor@gmail.com >
2022-03-31 18:41:14 -04:00