Script 'mail_helper' called by obssrc Hello community, here is the log from the commit of package cargo-audit-advisory-db for openSUSE:Factory checked in at 2021-11-12 15:59:22 ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Comparing /work/SRC/openSUSE:Factory/cargo-audit-advisory-db (Old) and /work/SRC/openSUSE:Factory/.cargo-audit-advisory-db.new.1890 (New) ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Package is "cargo-audit-advisory-db" Fri Nov 12 15:59:22 2021 rev:15 rq:930998 version:20211112 Changes: -------- --- /work/SRC/openSUSE:Factory/cargo-audit-advisory-db/cargo-audit-advisory-db.changes 2021-11-03 17:26:54.501358305 +0100 +++ /work/SRC/openSUSE:Factory/.cargo-audit-advisory-db.new.1890/cargo-audit-advisory-db.changes 2021-11-12 16:00:09.614589797 +0100 @@ -1,0 +2,15 @@ +Fri Nov 12 00:17:17 UTC 2021 - wbr...@suse.de + +- Update to version 20211112: + * Assigned RUSTSEC-2021-0122 to flatbuffers (#1100) + * Add `flatbuffers` advisory for flatbuffers#6627 (#1093) + * add cve info to advisories (#1099) + * Bump `rustsec-admin` to v0.5.3 (#1091) + * Add cvss information from nvd (#1085) + * Add missing method to time vulnerability (#1086) + * Add CVE alias for RUSTSEC-2021-0069 (#1087) + * Assigned RUSTSEC-2021-0121 to crypto2 (#1084) + * Unsound implementation of Chacha20 in crypto2 (#1072) + * Assigned RUSTSEC-2020-0159 to chrono (#1083) + +------------------------------------------------------------------- Old: ---- advisory-db-20211103.tar.xz New: ---- advisory-db-20211112.tar.xz ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Other differences: ------------------ ++++++ cargo-audit-advisory-db.spec ++++++ --- /var/tmp/diff_new_pack.BHCaHC/_old 2021-11-12 16:00:10.070590008 +0100 +++ /var/tmp/diff_new_pack.BHCaHC/_new 2021-11-12 16:00:10.070590008 +0100 @@ -17,7 +17,7 @@ Name: cargo-audit-advisory-db -Version: 20211103 +Version: 20211112 Release: 0 Summary: A database of known security issues for Rust depedencies License: CC0-1.0 ++++++ _service ++++++ --- /var/tmp/diff_new_pack.BHCaHC/_old 2021-11-12 16:00:10.102590022 +0100 +++ /var/tmp/diff_new_pack.BHCaHC/_new 2021-11-12 16:00:10.106590024 +0100 @@ -2,7 +2,7 @@ <service mode="disabled" name="obs_scm"> <param name="url">https://github.com/RustSec/advisory-db.git</param> <param name="scm">git</param> - <param name="version">20211103</param> + <param name="version">20211112</param> <param name="revision">master</param> <param name="changesgenerate">enable</param> <param name="changesauthor">wbr...@suse.de</param> ++++++ advisory-db-20211103.tar.xz -> advisory-db-20211112.tar.xz ++++++ diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/advisory-db-20211103/.duplicate-id-guard new/advisory-db-20211112/.duplicate-id-guard --- old/advisory-db-20211103/.duplicate-id-guard 2021-10-22 16:28:51.000000000 +0200 +++ new/advisory-db-20211112/.duplicate-id-guard 2021-11-07 18:53:20.000000000 +0100 @@ -1,3 +1,3 @@ This file causes merge conflicts if two ID assignment jobs run concurrently. This prevents duplicate ID assignment due to a race between those jobs. -95115d8c9869b0a0e3e4bdf781cf094e564ece260a8f34a89b73c762c1eb72cd - +9042bc5cd75d598f6aabe16f7a520b6886ac5abe65319eaee6cb8650f0e3085a - diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/advisory-db-20211103/crates/algorithmica/RUSTSEC-2021-0053.md new/advisory-db-20211112/crates/algorithmica/RUSTSEC-2021-0053.md --- old/advisory-db-20211103/crates/algorithmica/RUSTSEC-2021-0053.md 2021-10-22 16:28:51.000000000 +0200 +++ new/advisory-db-20211112/crates/algorithmica/RUSTSEC-2021-0053.md 2021-11-07 18:53:20.000000000 +0100 @@ -5,6 +5,7 @@ date = "2021-03-07" url = "https://github.com/AbrarNitk/algorithmica/issues/1" categories = ["memory-corruption"] +aliases = ["CVE-2021-31996"] [versions] patched = [] diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/advisory-db-20211103/crates/ammonia/RUSTSEC-2021-0074.md new/advisory-db-20211112/crates/ammonia/RUSTSEC-2021-0074.md --- old/advisory-db-20211103/crates/ammonia/RUSTSEC-2021-0074.md 2021-10-22 16:28:51.000000000 +0200 +++ new/advisory-db-20211112/crates/ammonia/RUSTSEC-2021-0074.md 2021-11-07 18:53:20.000000000 +0100 @@ -6,6 +6,7 @@ url = "https://github.com/rust-ammonia/ammonia/pull/142" categories = ["format-injection"] keywords = ["html", "xss"] +aliases = ["CVE-2021-38193"] [versions] patched = [">= 3.1.0", ">= 2.1.3, < 3.0.0"] diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/advisory-db-20211103/crates/anymap/RUSTSEC-2021-0065.md new/advisory-db-20211112/crates/anymap/RUSTSEC-2021-0065.md --- old/advisory-db-20211103/crates/anymap/RUSTSEC-2021-0065.md 2021-10-22 16:28:51.000000000 +0200 +++ new/advisory-db-20211112/crates/anymap/RUSTSEC-2021-0065.md 2021-11-07 18:53:20.000000000 +0100 @@ -5,6 +5,8 @@ date = "2021-05-07" informational = "unmaintained" url = "https://github.com/chris-morgan/anymap/issues/37" +aliases = ["CVE-2021-38187"] + [versions] patched = [] unaffected = [] diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/advisory-db-20211103/crates/ark-r1cs-std/RUSTSEC-2021-0075.md new/advisory-db-20211112/crates/ark-r1cs-std/RUSTSEC-2021-0075.md --- old/advisory-db-20211103/crates/ark-r1cs-std/RUSTSEC-2021-0075.md 2021-10-22 16:28:51.000000000 +0200 +++ new/advisory-db-20211112/crates/ark-r1cs-std/RUSTSEC-2021-0075.md 2021-11-07 18:53:20.000000000 +0100 @@ -6,6 +6,7 @@ categories = ["crypto-failure"] keywords = ["r1cs", "zksnark", "arkworks"] url = "https://github.com/arkworks-rs/r1cs-std/pull/70" +aliases = ["CVE-2021-38194"] [versions] patched = [">= 0.3.1"] diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/advisory-db-20211103/crates/better-macro/RUSTSEC-2021-0077.md new/advisory-db-20211112/crates/better-macro/RUSTSEC-2021-0077.md --- old/advisory-db-20211103/crates/better-macro/RUSTSEC-2021-0077.md 2021-10-22 16:28:51.000000000 +0200 +++ new/advisory-db-20211112/crates/better-macro/RUSTSEC-2021-0077.md 2021-11-07 18:53:20.000000000 +0100 @@ -6,6 +6,7 @@ url = "https://github.com/raycar5/better-macro/blob/24ff1702397b9c19bbfa4c660e2316cd77d3b900/src/lib.rs#L36-L38" categories = ["code-execution"] keywords = ["rce", "proc-macro"] +aliases = ["CVE-2021-38196"] [affected] functions = { "better_macro::println" = ["> 1.0.0"] } diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/advisory-db-20211103/crates/comrak/RUSTSEC-2021-0063.md new/advisory-db-20211112/crates/comrak/RUSTSEC-2021-0063.md --- old/advisory-db-20211103/crates/comrak/RUSTSEC-2021-0063.md 2021-10-22 16:28:51.000000000 +0200 +++ new/advisory-db-20211112/crates/comrak/RUSTSEC-2021-0063.md 2021-11-07 18:53:20.000000000 +0100 @@ -6,6 +6,7 @@ url = "https://github.com/kivikakk/comrak/releases/tag/0.10.1" categories = ["format-injection"] keywords = ["xss"] +aliases = ["CVE-2021-38186"] [versions] patched = [">= 0.10.1"] diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/advisory-db-20211103/crates/flatbuffers/RUSTSEC-2021-0122.md new/advisory-db-20211112/crates/flatbuffers/RUSTSEC-2021-0122.md --- old/advisory-db-20211103/crates/flatbuffers/RUSTSEC-2021-0122.md 1970-01-01 01:00:00.000000000 +0100 +++ new/advisory-db-20211112/crates/flatbuffers/RUSTSEC-2021-0122.md 2021-11-07 18:53:20.000000000 +0100 @@ -0,0 +1,23 @@ +```toml +[advisory] +id = "RUSTSEC-2021-0122" +package = "flatbuffers" +cvss = "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" +date = "2021-10-31" +url = "https://github.com/google/flatbuffers/issues/6627" + +[versions] +patched = [] +``` + +# Generated code can read and write out of bounds in safe code + +Code generated by flatbuffers' compiler is `unsafe` but not marked as such. +See https://github.com/google/flatbuffers/issues/6627 for details. + +All users that use generated code by `flatbuffers` compiler are recommended to: +1. not expose flatbuffer generated code as part of their public APIs +2. audit their code and look for any usage of `follow`, `push`, or any method that uses them + (e.g. `self_follow`). +3. Carefuly go through the crates' documentation to understand which "safe" APIs are not + intended to be used. diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/advisory-db-20211103/crates/iced-x86/RUSTSEC-2021-0068.md new/advisory-db-20211112/crates/iced-x86/RUSTSEC-2021-0068.md --- old/advisory-db-20211103/crates/iced-x86/RUSTSEC-2021-0068.md 2021-10-22 16:28:51.000000000 +0200 +++ new/advisory-db-20211112/crates/iced-x86/RUSTSEC-2021-0068.md 2021-11-07 18:53:20.000000000 +0100 @@ -5,6 +5,7 @@ date = "2021-05-19" url = "https://github.com/icedland/iced/issues/168" keywords = ["soundness"] +aliases = ["CVE-2021-38188"] [affected] functions = { "iced_x86::Decoder::new" = ["<= 1.10.3"] } diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/advisory-db-20211103/crates/libsecp256k1/RUSTSEC-2021-0076.md new/advisory-db-20211112/crates/libsecp256k1/RUSTSEC-2021-0076.md --- old/advisory-db-20211103/crates/libsecp256k1/RUSTSEC-2021-0076.md 2021-10-22 16:28:51.000000000 +0200 +++ new/advisory-db-20211112/crates/libsecp256k1/RUSTSEC-2021-0076.md 2021-11-07 18:53:20.000000000 +0100 @@ -5,6 +5,8 @@ date = "2021-07-13" url = "https://github.com/paritytech/libsecp256k1/pull/67" categories = ["crypto-failure"] +aliases = ["CVE-2021-38195"] + [versions] patched = [">= 0.5.0"] ``` diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/advisory-db-20211103/crates/nalgebra/RUSTSEC-2021-0070.md new/advisory-db-20211112/crates/nalgebra/RUSTSEC-2021-0070.md --- old/advisory-db-20211103/crates/nalgebra/RUSTSEC-2021-0070.md 2021-10-22 16:28:51.000000000 +0200 +++ new/advisory-db-20211112/crates/nalgebra/RUSTSEC-2021-0070.md 2021-11-07 18:53:20.000000000 +0100 @@ -6,6 +6,7 @@ url = "https://github.com/dimforge/nalgebra/issues/883" categories = ["memory-corruption", "memory-exposure"] keywords = ["memory-safety"] +aliases = ["CVE-2021-38190"] [versions] patched = [">= 0.27.1"] diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/advisory-db-20211103/crates/prost-types/RUSTSEC-2021-0073.md new/advisory-db-20211112/crates/prost-types/RUSTSEC-2021-0073.md --- old/advisory-db-20211103/crates/prost-types/RUSTSEC-2021-0073.md 2021-10-22 16:28:51.000000000 +0200 +++ new/advisory-db-20211112/crates/prost-types/RUSTSEC-2021-0073.md 2021-11-07 18:53:20.000000000 +0100 @@ -6,6 +6,7 @@ url = "https://github.com/tokio-rs/prost/issues/438" categories = ["denial-of-service"] keywords = ["denial-of-service"] +aliases = ["CVE-2021-38192"] [versions] patched = [">= 0.8.0"] diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/advisory-db-20211103/crates/tokio/RUSTSEC-2021-0072.md new/advisory-db-20211112/crates/tokio/RUSTSEC-2021-0072.md --- old/advisory-db-20211103/crates/tokio/RUSTSEC-2021-0072.md 2021-10-22 16:28:51.000000000 +0200 +++ new/advisory-db-20211112/crates/tokio/RUSTSEC-2021-0072.md 2021-11-07 18:53:20.000000000 +0100 @@ -6,6 +6,7 @@ url = "https://github.com/tokio-rs/tokio/issues/3929" categories = ["memory-corruption"] keywords = ["race condition", "send"] +aliases = ["CVE-2021-38191"] [affected] functions = { "tokio::task::JoinHandle::abort" = ["<= 1.8.0, >= 0.3.0"] }