Alexis Mousset
2ed85d2178
Update aliases from GHSA OSV export
2023-07-08 13:51:43 +02:00
Linus Färnstrand
1f538e6f3b
Update RUSTSEC-2021-0145.md with stable IsTerminal ( #1725 )
...
Since `IsTerminal` is now stable, this CVE can recommend that first
2023-06-29 12:21:59 +00:00
github-actions[bot]
9cf72357c8
Assigned RUSTSEC-2023-0046 to cyfs-base ( #1723 )
...
Co-authored-by: tarcieri <tarcieri@users.noreply.github.com >
2023-06-22 09:43:08 -06:00
Rafael
a64182cf0f
report misaligned pointer dereference in cyfs-base ( #1718 )
2023-06-22 09:42:06 -06:00
github-actions[bot]
76c37849b6
Assigned RUSTSEC-2023-0045 to memoffset ( #1722 )
...
Co-authored-by: Shnatsel <Shnatsel@users.noreply.github.com >
2023-06-21 12:29:36 +00:00
Kisaragi
27aa255f11
Add advisory to memoffset ( #1721 )
...
* Add advisory to `memoffset`
* fix invalid category
2023-06-21 12:23:59 +00:00
github-actions[bot]
29b04da119
Assigned RUSTSEC-2023-0044 to openssl ( #1720 )
...
Co-authored-by: Shnatsel <Shnatsel@users.noreply.github.com >
2023-06-20 17:34:12 -04:00
Alex Gaynor
e8534eadc5
Report buffer-overread in OpenSSL ( #1719 )
...
* Report buffer-overread in OpenSSL
* Rename RUSTSEC-0000-0000 to RUSTSEC-0000-0000.md
2023-06-20 21:32:25 +00:00
joshua-maros
37abf6e463
Update RUSTSEC-2023-0042 to reflect patch. ( #1717 )
2023-06-15 11:07:09 +00:00
github-actions[bot]
13b9455e9f
Assigned RUSTSEC-2023-0043 to ftp ( #1714 )
...
Co-authored-by: tarcieri <tarcieri@users.noreply.github.com >
2023-06-14 07:23:36 -06:00
Christian Visintin
3ad954ae91
Add unmaintained ftp crate ( #1612 )
2023-06-14 07:21:57 -06:00
Alexis Mousset
84c633df9c
Update aliases from GHSA OSV export ( #1693 )
2023-06-13 15:10:24 +02:00
github-actions[bot]
ea9ad160b6
Assigned RUSTSEC-2023-0042 to ouroboros ( #1708 )
...
Co-authored-by: Shnatsel <Shnatsel@users.noreply.github.com >
2023-06-12 02:10:09 +02:00
joshua-maros
ae311156f9
Ouroboros Soundess Issue ( #1707 )
2023-06-12 02:08:57 +02:00
github-actions[bot]
af3f3d503f
Assigned RUSTSEC-2023-0041 to trust-dns-server ( #1704 )
...
Co-authored-by: Shnatsel <Shnatsel@users.noreply.github.com >
2023-06-03 19:41:41 +00:00
Jonas Bushart
a14884ebf4
Vulnerability in trust-dns and trust-dns-server ( #1703 )
...
An attacker can form packet loops between vulnerable instances leading
to a denial-of-service for both network and CPU resources.
2023-06-03 19:40:41 +00:00
github-actions[bot]
d32ef82010
Assigned RUSTSEC-2023-0040 to users ( #1702 )
...
Co-authored-by: tarcieri <tarcieri@users.noreply.github.com >
2023-06-01 10:22:47 -06:00
Zeeshan Ali Khan
99d0a82b66
🦺 Advisory for unmaintained crate, users ( #1701 )
2023-06-01 10:15:25 -06:00
github-actions[bot]
f343db0846
Assigned RUSTSEC-2023-0039 to buffered-reader ( #1700 )
...
Co-authored-by: amousset <amousset@users.noreply.github.com >
2023-05-31 23:03:14 +02:00
Neal H. Walfield
8a7fc61c92
Add advisory for buffered-reader ( #1697 )
...
Attacker-controlled input can lead to an out-of-bounds index, which
causes buffered-reader to panic. This has been fixed in versions
1.2.0, 1.1.5, and 1.0.2 of buffered-reader.
2023-05-31 23:02:26 +02:00
github-actions[bot]
66dbd2c1a8
Assigned RUSTSEC-2023-0038 to sequoia-openpgp ( #1699 )
...
Co-authored-by: amousset <amousset@users.noreply.github.com >
2023-05-31 23:02:12 +02:00
Neal H. Walfield
ee9ec5f605
Add advisory for sequoia-openpgp ( #1696 )
...
Attacker-controlled input can lead to an out-of-bounds index, which
causes sequoia-openpgp to panic. This has been fixed in versions
1.16.0, 1.8.1, and 1.1.1 of sequoia-openpgp.
2023-05-31 22:54:59 +02:00
Ralph Giles
e162556b9e
Suggest kuchikiki as an alternative to kuchiki ( #1698 )
...
The `kuchiki` crate has been marked unmaintained. We're continuing
to support a fork under then name `kuchikiki` which we intend to
remain semver-compatible with our former upstream.
Suggest this as an alternative in RUSTSEC-2023-0019 since it is
a direct replacement; the other alternatives involve significant
porting effort.
2023-05-23 14:17:25 -06:00
github-actions[bot]
0e97e6e71f
Assigned RUSTSEC-2023-0037 to xsalsa20poly1305 ( #1695 )
...
Co-authored-by: tarcieri <tarcieri@users.noreply.github.com >
2023-05-16 21:02:51 -06:00
Tony Arcieri
dc083e6955
xsalsa20poly1305 is unmaintained ( #1694 )
...
See https://github.com/RustCrypto/AEADs/pull/525
2023-05-16 21:01:49 -06:00
Kornel
50bed3ba40
xml-rs is maintained ( #1691 )
2023-05-05 09:39:54 +02:00
github-actions[bot]
d72795ee51
Assigned RUSTSEC-2023-0036 to tree_magic ( #1689 )
...
Co-authored-by: tarcieri <tarcieri@users.noreply.github.com >
2023-04-24 21:08:42 -06:00
Sanpi
cb9a1fea8e
Add unmaintained tree_magic crate ( #1678 )
2023-04-24 20:54:26 -06:00
github-actions[bot]
5f4eca1362
Assigned RUSTSEC-2023-0035 to enumflags2 ( #1688 )
...
Co-authored-by: tarcieri <tarcieri@users.noreply.github.com >
2023-04-23 14:33:42 -06:00
Maja Kądziołka
0444576c2a
enumflags2::make_bitflags unsoundness ( #1686 )
2023-04-23 14:32:26 -06:00
github-actions[bot]
cab69cc909
Assigned RUSTSEC-2023-0034 to h2 ( #1687 )
...
Co-authored-by: tarcieri <tarcieri@users.noreply.github.com >
2023-04-20 13:17:55 -06:00
Kisaragi
7ca4586eb8
Add advisory for h2: resource exhaustion vulnerability may lead to DoS ( #1684 )
...
Co-authored-by: Tony Arcieri <bascule@gmail.com >
Co-authored-by: Sean McArthur <sean@seanmonstar.com >
2023-04-20 13:16:09 -06:00
Max Ammann
23ff35f825
Fix typos in RUSTSEC-2023-0033 ( #1685 )
...
* Fix typos in RUSTSEC-2023-0033.md
* Update RUSTSEC-2023-0033.md
2023-04-13 17:43:33 +00:00
github-actions[bot]
f2f107fb96
Assigned RUSTSEC-2023-0033 to borsh ( #1683 )
...
Co-authored-by: Shnatsel <Shnatsel@users.noreply.github.com >
2023-04-13 17:03:15 +00:00
Max Ammann
c4a10fa281
Add notice for borsh issue ( #1682 )
...
* Create RUSTSEC-0000-0000.md
* Update RUSTSEC-0000-0000.md
* Update crates/borsh/RUSTSEC-0000-0000.md
Co-authored-by: Sergey "Shnatsel" Davidoff <shnatsel@gmail.com >
* Update RUSTSEC-0000-0000.md
* Update RUSTSEC-0000-0000.md
---------
Co-authored-by: Sergey "Shnatsel" Davidoff <shnatsel@gmail.com >
2023-04-13 17:02:24 +00:00
dependabot[bot]
c358dc290a
Bump peter-evans/create-pull-request from 4 to 5 ( #1677 )
...
Bumps [peter-evans/create-pull-request](https://github.com/peter-evans/create-pull-request ) from 4 to 5.
- [Release notes](https://github.com/peter-evans/create-pull-request/releases )
- [Commits](https://github.com/peter-evans/create-pull-request/compare/v4...v5 )
---
updated-dependencies:
- dependency-name: peter-evans/create-pull-request
dependency-type: direct:production
update-type: version-update:semver-major
...
Signed-off-by: dependabot[bot] <support@github.com >
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2023-04-10 09:47:56 -06:00
Rodolphe Bréard
e6600338c8
Withdraw RUSTSEC-2021-0147 ( #1676 )
...
On Feb 19 2023, the author started to maintain the `daemonize` crate
again. Version 0.5.0 has been released on Feb 25 2023. Therefore, this
crate in no longer unmaintained.
rel #1543
2023-04-08 21:49:55 +02:00
github-actions[bot]
6078097fb6
Assigned RUSTSEC-2023-0032 to ntru ( #1674 )
...
Co-authored-by: pinkforest <pinkforest@users.noreply.github.com >
2023-04-06 20:57:33 +10:00
jcaesar
1eab8594ea
Add unsound ntru ( #1652 )
...
* Add ntru unsoundness advisory
* Remove redundant unaffected
* Remove non-versions
---------
Co-authored-by: pinkforest(she/her) <36498018+pinkforest@users.noreply.github.com >
2023-04-06 20:55:26 +10:00
github-actions[bot]
b0e918536d
Assigned RUSTSEC-2023-0031 to spin ( #1673 )
...
Co-authored-by: pinkforest <pinkforest@users.noreply.github.com >
2023-04-04 06:56:24 +10:00
Joshua Barretto
8d868299ea
Added unsound spin ( #1671 )
...
* Added advisory for spin
* Remove withdrawn artifact
---------
Co-authored-by: pinkforest(she/her) <36498018+pinkforest@users.noreply.github.com >
2023-04-04 06:55:45 +10:00
github-actions[bot]
719587479a
Assigned RUSTSEC-2023-0030 to versionize ( #1669 )
...
Co-authored-by: Shnatsel <Shnatsel@users.noreply.github.com >
2023-03-25 12:18:50 +00:00
Patrick Roy
63a2f95771
Add advisory for versionize crate ( #1662 )
...
Signed-off-by: Patrick Roy <roypat@amazon.co.uk >
2023-03-25 12:17:08 +00:00
github-actions[bot]
dea5184a2b
Assigned RUSTSEC-2023-0029 to nats ( #1668 )
...
Co-authored-by: pinkforest <pinkforest@users.noreply.github.com >
2023-03-25 22:37:35 +11:00
pinkforest(she/her)
127e4e658f
Fix nats directory ( #1667 )
...
* Fix nats directory
* Fix patched
2023-03-25 22:36:46 +11:00
Paolo Barbolini
0a1c2353f9
nats MitM vulnerability ( #1665 )
...
* nats MitM vulnerability
* Suggest switching to `async-nats`
2023-03-25 22:27:07 +11:00
github-actions[bot]
735bd0286f
Assigned RUSTSEC-2023-0027 to async-nats, RUSTSEC-2023-0028 to buf_redux ( #1664 )
...
Co-authored-by: pinkforest <pinkforest@users.noreply.github.com >
2023-03-25 02:42:41 +11:00
Ossi Herrala
b3d6563b3b
Add unmaintained buf_redux ( #1614 )
...
* Add unmaintained advisory of buf_redux
Fixes #1602
* Fil in the advisory
* Wording fixes
* Typo fix
* Wording fixes
* Grammar
* Alloc not core crate for Vec
* Add fork option
---------
Co-authored-by: pinkforest <36498018+pinkforest@users.noreply.github.com >
2023-03-25 02:39:27 +11:00
Paolo Barbolini
6035ece499
async-nats MitM vulnerability ( #1661 )
...
* Create RUSTSEC-0000-0000.md
* Add category
Co-authored-by: Tony Arcieri <bascule@gmail.com >
* Improve title
* Improve the description and reintroduce formatting
* Update RUSTSEC-0000-0000.md
* Update RUSTSEC-0000-0000.md
---------
Co-authored-by: Tony Arcieri <bascule@gmail.com >
2023-03-24 15:38:47 +00:00
github-actions[bot]
c48913e44d
Assigned RUSTSEC-2023-0025 to git-hash, RUSTSEC-2023-0026 to git-path ( #1663 )
...
Co-authored-by: pinkforest <pinkforest@users.noreply.github.com >
2023-03-25 02:33:49 +11:00