Script 'mail_helper' called by obssrc
Hello community,

here is the log from the commit of package cargo-audit-advisory-db for 
openSUSE:Factory checked in at 2022-02-15 23:57:16
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Factory/cargo-audit-advisory-db (Old)
 and      /work/SRC/openSUSE:Factory/.cargo-audit-advisory-db.new.1956 (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Package is "cargo-audit-advisory-db"

Tue Feb 15 23:57:16 2022 rev:19 rq:954420 version:20220215

Changes:
--------
--- 
/work/SRC/openSUSE:Factory/cargo-audit-advisory-db/cargo-audit-advisory-db.changes
  2022-01-06 15:50:50.252956571 +0100
+++ 
/work/SRC/openSUSE:Factory/.cargo-audit-advisory-db.new.1956/cargo-audit-advisory-db.changes
        2022-02-15 23:57:35.604264393 +0100
@@ -1,0 +2,15 @@
+Tue Feb 15 00:57:25 UTC 2022 - wbr...@suse.de
+
+- Update to version 20220215:
+  * Suggest maintained alternatives for Rental advisory (#1187)
+  * Update RUSTSEC-2022-0009.md (#1186)
+  * Assigned RUSTSEC-2020-0162 to tokio-proto (#1185)
+  * Mark tokio-proto as deprecated (#1184)
+  * Assigned RUSTSEC-2022-0009 to libp2p-core (#1183)
+  * Add entry for libp2p-core vulnerability (#1182)
+  * Add patched version to DashMap advisory (#1181)
+  * Assigned RUSTSEC-2022-0008 to windows (#1178)
+  * Add advisory for windows (#1177)
+  * Assigned RUSTSEC-2022-0007 to qcell (#1172)
+
+-------------------------------------------------------------------

Old:
----
  advisory-db-20220105.tar.xz

New:
----
  advisory-db-20220215.tar.xz

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Other differences:
------------------
++++++ cargo-audit-advisory-db.spec ++++++
--- /var/tmp/diff_new_pack.5T7p4E/_old  2022-02-15 23:57:36.076265696 +0100
+++ /var/tmp/diff_new_pack.5T7p4E/_new  2022-02-15 23:57:36.080265707 +0100
@@ -17,7 +17,7 @@
 
 
 Name:           cargo-audit-advisory-db
-Version:        20220105
+Version:        20220215
 Release:        0
 Summary:        A database of known security issues for Rust depedencies
 License:        CC0-1.0

++++++ _service ++++++
--- /var/tmp/diff_new_pack.5T7p4E/_old  2022-02-15 23:57:36.116265807 +0100
+++ /var/tmp/diff_new_pack.5T7p4E/_new  2022-02-15 23:57:36.120265818 +0100
@@ -2,7 +2,7 @@
   <service mode="disabled" name="obs_scm">
     <param name="url">https://github.com/RustSec/advisory-db.git</param>
     <param name="scm">git</param>
-    <param name="version">20220105</param>
+    <param name="version">20220215</param>
     <param name="revision">master</param>
     <param name="changesgenerate">enable</param>
     <param name="changesauthor">wbr...@suse.de</param>

++++++ advisory-db-20220105.tar.xz -> advisory-db-20220215.tar.xz ++++++
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/advisory-db-20220105/.duplicate-id-guard 
new/advisory-db-20220215/.duplicate-id-guard
--- old/advisory-db-20220105/.duplicate-id-guard        2021-12-27 
20:44:42.000000000 +0100
+++ new/advisory-db-20220215/.duplicate-id-guard        2022-02-09 
15:34:03.000000000 +0100
@@ -1,3 +1,3 @@
 This file causes merge conflicts if two ID assignment jobs run concurrently.
 This prevents duplicate ID assignment due to a race between those jobs.
-1c73b234ccce2c42ef5a2422c20f09804ff06fd326ac338bf1429a31fd5bf4cc  -
+5518448e55d2a585c2a6276dba5d12fb0afe464d10790643ed57c0a18c53a126  -
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/advisory-db-20220105/README.md 
new/advisory-db-20220215/README.md
--- old/advisory-db-20220105/README.md  2021-12-27 20:44:42.000000000 +0100
+++ new/advisory-db-20220215/README.md  2022-02-09 15:34:03.000000000 +0100
@@ -1,7 +1,7 @@
 # RustSec Advisory Database
 
 [![Build Status][build-image]][build-link]
-![Maintained: Q2 2021][maintained-image]
+![Maintained: Q1 2022][maintained-image]
 [![Project Chat][chat-image]][chat-link]
 
 The RustSec Advisory Database is a repository of security advisories filed
@@ -115,7 +115,7 @@
 
 [build-image]: 
https://github.com/rustsec/advisory-db/workflows/Validate/badge.svg
 [build-link]: https://github.com/rustsec/advisory-db/actions
-[maintained-image]: https://img.shields.io/maintenance/yes/2021.svg
+[maintained-image]: https://img.shields.io/maintenance/yes/2022.svg
 [chat-image]: https://img.shields.io/badge/zulip-join_chat-blue.svg
 [chat-link]: 
https://rust-lang.zulipchat.com/#narrow/stream/146229-wg-secure-code/
 
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/advisory-db-20220105/crates/ammonia/RUSTSEC-2022-0003.md 
new/advisory-db-20220215/crates/ammonia/RUSTSEC-2022-0003.md
--- old/advisory-db-20220105/crates/ammonia/RUSTSEC-2022-0003.md        
1970-01-01 01:00:00.000000000 +0100
+++ new/advisory-db-20220215/crates/ammonia/RUSTSEC-2022-0003.md        
2022-02-09 15:34:03.000000000 +0100
@@ -0,0 +1,25 @@
+```toml
+[advisory]
+id = "RUSTSEC-2022-0003"
+package = "ammonia"
+date = "2022-01-19"
+url = "https://github.com/rust-ammonia/ammonia/pull/147";
+categories = ["format-injection"]
+keywords = ["html", "xss"]
+
+[affected]
+functions = { "ammonia::clean_text" = ["<= 3.1.2"] }
+
+[versions]
+patched = [">= 3.1.3"]
+unaffected = ["< 3.0.0"]
+```
+
+# Space bug in `clean_text`
+
+An incorrect mapping from HTML specification to ASCII codes was used.
+Because HTML treats the Form Feed as whitespace, code like this has an 
injection bug:
+
+    let html = format!("<div title={}>", clean_text(user_supplied_string));
+
+Applications are not affected if they quote their attributes, or if they don't 
use `clean_text` at all.
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/advisory-db-20220105/crates/array-macro/RUSTSEC-2020-0161.md 
new/advisory-db-20220215/crates/array-macro/RUSTSEC-2020-0161.md
--- old/advisory-db-20220105/crates/array-macro/RUSTSEC-2020-0161.md    
1970-01-01 01:00:00.000000000 +0100
+++ new/advisory-db-20220215/crates/array-macro/RUSTSEC-2020-0161.md    
2022-02-09 15:34:03.000000000 +0100
@@ -0,0 +1,38 @@
+```toml
+[advisory]
+id = "RUSTSEC-2020-0161"
+package = "array-macro"
+date = "2020-05-07"
+url = 
"https://gitlab.com/KonradBorowski/array-macro/-/commit/01940637dd8f3bfeeee3faf9639fa9ae52f19f4d";
+categories = ["memory-corruption"]
+informational = "unsound"
+
+[versions]
+patched = [">= 1.0.5"]
+unaffected = ["< 0.1.2"]
+```
+
+# `array!` macro is unsound in presence of traits that implement methods it 
calls internally
+
+Affected versions of this crate called some methods using auto-ref. The 
affected code looked like this.
+
+```rust
+let mut arr = $crate::__core::mem::MaybeUninit::uninit();
+let mut vec = $crate::__ArrayVec::<T>::new(arr.as_mut_ptr() as *mut T);
+```
+
+In this case, the problem is that `as_mut_ptr` is a method of `&mut 
MaybeUninit`, not `MaybeUninit`. This made it possible for traits to hijack the 
method calls in order to cause unsoundness.
+
+```rust
+trait AsMutPtr<T> {
+    fn as_mut_ptr(&self) -> *mut T;
+}
+impl<T> AsMutPtr<T> for std::mem::MaybeUninit<T> {
+    fn as_mut_ptr(&self) -> *mut T {
+        std::ptr::null_mut()
+    }
+}
+array![0; 1];
+```
+
+The flaw was corrected by explicitly referencing variables in macro body in 
order to avoid auto-ref.
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/advisory-db-20220105/crates/dashmap/RUSTSEC-2022-0002.md 
new/advisory-db-20220215/crates/dashmap/RUSTSEC-2022-0002.md
--- old/advisory-db-20220105/crates/dashmap/RUSTSEC-2022-0002.md        
1970-01-01 01:00:00.000000000 +0100
+++ new/advisory-db-20220215/crates/dashmap/RUSTSEC-2022-0002.md        
2022-02-09 15:34:03.000000000 +0100
@@ -0,0 +1,36 @@
+```toml
+[advisory]
+id = "RUSTSEC-2022-0002"
+package = "dashmap"
+date = "2022-01-10"
+url = "https://github.com/xacrimon/dashmap/issues/167";
+categories = ["memory-exposure", "memory-corruption"]
+keywords = ["segfault", "use-after-free"]
+
+[affected.functions]
+"dashmap::mapref::multiple::RefMulti::key" = [">= 5.0.0"]
+"dashmap::mapref::multiple::RefMulti::value" = [">= 5.0.0"]
+"dashmap::mapref::multiple::RefMulti::pair" = [">= 5.0.0"]
+"dashmap::mapref::multiple::RefMutMulti::key" = [">= 5.0.0"]
+"dashmap::mapref::multiple::RefMutMulti::pair" = [">= 5.0.0"]
+"dashmap::mapref::multiple::RefMutMulti::pair_mut" = [">= 5.0.0"]
+"dashmap::mapref::one::Ref::key" = [">= 5.0.0"]
+"dashmap::mapref::one::Ref::value" = [">= 5.0.0"]
+"dashmap::mapref::one::Ref::pair" = [">= 5.0.0"]
+"dashmap::mapref::one::RefMut::key" = [">= 5.0.0"]
+"dashmap::mapref::one::RefMut::pair" = [">= 5.0.0"]
+"dashmap::mapref::one::RefMut::pair_mut" = [">= 5.0.0"]
+"dashmap::setref::multiple::RefMulti::key" = [">= 5.0.0"]
+"dashmap::setref::one::Ref::key" = [">= 5.0.0"]
+
+[versions]
+patched = [">= 5.1.0"]
+unaffected = ["< 5.0.0"]
+```
+
+# Unsoundness in `dashmap` references
+
+Reference returned by some methods of `Ref` (and similar types) may outlive 
the `Ref` and escape the lock.
+This causes undefined behavior and may result in a segfault.
+
+More information in 
[`dashmap#167`](https://github.com/xacrimon/dashmap/issues/167) issue.
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/advisory-db-20220105/crates/ftd2xx-embedded-hal/RUSTSEC-2022-0005.md 
new/advisory-db-20220215/crates/ftd2xx-embedded-hal/RUSTSEC-2022-0005.md
--- old/advisory-db-20220105/crates/ftd2xx-embedded-hal/RUSTSEC-2022-0005.md    
1970-01-01 01:00:00.000000000 +0100
+++ new/advisory-db-20220215/crates/ftd2xx-embedded-hal/RUSTSEC-2022-0005.md    
2022-02-09 15:34:03.000000000 +0100
@@ -0,0 +1,20 @@
+```toml
+[advisory]
+id = "RUSTSEC-2022-0005"
+package = "ftd2xx-embedded-hal"
+date = "2022-01-22"
+informational = "unmaintained"
+url = "https://github.com/newAM/ftd2xx-embedded-hal/pull/40";
+
+[versions]
+patched = []
+unaffected = []
+```
+
+# crate has been renamed to `ftdi-embedded-hal`
+
+This crate has been renamed from `ftd2xx-embedded-hal` to `ftdi-embedded-hal`.
+
+The new repository location is:
+
+<https://github.com/ftdi-rs/ftdi-embedded-hal>
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/advisory-db-20220105/crates/libp2p-core/RUSTSEC-2022-0009.md 
new/advisory-db-20220215/crates/libp2p-core/RUSTSEC-2022-0009.md
--- old/advisory-db-20220105/crates/libp2p-core/RUSTSEC-2022-0009.md    
1970-01-01 01:00:00.000000000 +0100
+++ new/advisory-db-20220215/crates/libp2p-core/RUSTSEC-2022-0009.md    
2022-02-09 15:34:03.000000000 +0100
@@ -0,0 +1,21 @@
+```toml
+[advisory]
+id = "RUSTSEC-2022-0009"
+package = "libp2p-core"
+date = "2022-02-07"
+categories = ["crypto-failure"]
+
+[affected]
+functions = { "libp2p_core::PeerRecord::from_signed_envelope" = [">= 
0.30.0-rc.1"] }
+
+[versions]
+unaffected = ["< 0.30.0-rc.1"]
+patched = ["^ 0.30.2", ">= 0.31.1"]
+```
+
+# Failure to verify the public key of a `SignedEnvelope` against the `PeerId` 
in a `PeerRecord`
+
+Affected versions of this crate did not check that the public key the 
signature was created with matches the peer ID of the peer record. 
+Any combination was considered valid.
+
+This allows an attacker to republish an existing `PeerRecord` with a different 
`PeerId`.
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/advisory-db-20220105/crates/lmdb/RUSTSEC-2022-0001.md 
new/advisory-db-20220215/crates/lmdb/RUSTSEC-2022-0001.md
--- old/advisory-db-20220105/crates/lmdb/RUSTSEC-2022-0001.md   1970-01-01 
01:00:00.000000000 +0100
+++ new/advisory-db-20220215/crates/lmdb/RUSTSEC-2022-0001.md   2022-02-09 
15:34:03.000000000 +0100
@@ -0,0 +1,16 @@
+```toml
+[advisory]
+id = "RUSTSEC-2022-0001"
+package = "lmdb"
+date = "2022-01-05"
+url = "https://github.com/danburkert/lmdb-rs";
+informational = "unmaintained"
+[versions]
+patched = []
+```
+
+# lmdb is unmaintained, use lmdb-rkv instead
+
+The lmdb crate hasn't had any updates since August 2018.
+
+Mozilla's [lmdb-rkv](https://github.com/mozilla/lmdb-rs) fork of the crate has 
received additional maintenance work beyond that and is the best available 
replacement.
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/advisory-db-20220105/crates/qcell/RUSTSEC-2022-0007.md 
new/advisory-db-20220215/crates/qcell/RUSTSEC-2022-0007.md
--- old/advisory-db-20220105/crates/qcell/RUSTSEC-2022-0007.md  1970-01-01 
01:00:00.000000000 +0100
+++ new/advisory-db-20220215/crates/qcell/RUSTSEC-2022-0007.md  2022-02-09 
15:34:03.000000000 +0100
@@ -0,0 +1,26 @@
+```toml
+[advisory]
+id = "RUSTSEC-2022-0007"
+package = "qcell"
+date = "2022-01-24"
+url = "https://github.com/uazu/qcell/issues/20";
+informational = "unsound"
+keywords = ["unsound"]
+
+[versions]
+patched = [">= 0.4.3"]
+
+```
+
+# A malicious coder can get unsound access to TCell or TLCell memory
+
+This is impossible to do by accident, but by carefully constructing
+marker types to be covariant, a malicious coder can cheat the
+singleton check in `TCellOwner` and `TLCellOwner`, giving unsound
+access to cell memory.  This could take the form of getting two
+mutable references to the same memory, or a mutable reference and an
+immutable reference.
+
+The fix is for the crate to internally force the marker type to be
+invariant.  This blocks the conversion between covariant types which
+Rust normally allows.
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/advisory-db-20220105/crates/rental/RUSTSEC-2021-0134.md 
new/advisory-db-20220215/crates/rental/RUSTSEC-2021-0134.md
--- old/advisory-db-20220105/crates/rental/RUSTSEC-2021-0134.md 2021-12-27 
20:44:42.000000000 +0100
+++ new/advisory-db-20220215/crates/rental/RUSTSEC-2021-0134.md 2022-02-09 
15:34:03.000000000 +0100
@@ -13,3 +13,10 @@
 # rental is unmaintained, author has moved on
 
 The author encourages users to explore other solutions, or maintain a fork.
+
+Maintained alternatives include:
+
+* [`ouroboros`](https://crates.io/crates/ouroboros)
+* [`recursive_reference`](https://crates.io/crates/recursive_reference)
+* [`fortify`](https://crates.io/crates/fortify)
+* [`escher`](https://crates.io/crates/escher)
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/advisory-db-20220105/crates/rust-crypto/RUSTSEC-2016-0005.md 
new/advisory-db-20220215/crates/rust-crypto/RUSTSEC-2016-0005.md
--- old/advisory-db-20220105/crates/rust-crypto/RUSTSEC-2016-0005.md    
2021-12-27 20:44:42.000000000 +0100
+++ new/advisory-db-20220215/crates/rust-crypto/RUSTSEC-2016-0005.md    
2022-02-09 15:34:03.000000000 +0100
@@ -46,15 +46,6 @@
 - [`secp256k1`]:
   - Key agreement: ECDH (secp256k1 only)
   - Signature algorithms: ECDSA (secp256k1 only)
-- [`sodiumoxide`]:
-  - AEAD algorithms: ChaCha20Poly1305 (IETF version)
-  - Digest algorithms: SHA-256, SHA-512
-  - HMAC
-  - Key agreement: X25519 + BLAKE2b
-  - Password hashing: Argon2(i/d), scrypt
-  - Public key encryption: NaCl "Box" (X25519 + XSalsa20Poly1305)
-  - Signature algorithms: Ed25519
-  - Short-input PRF: SipHash24
 - [`orion`]:
   - AEAD algorithms: ChaCha20Poly1305 (IETF version), XChaCha20Poly1305
   - Digest algorithms: SHA-512, BLAKE2b
@@ -90,7 +81,6 @@
 [`sha-1`]: https://crates.io/crates/sha-1
 [`sha2`]: https://crates.io/crates/sha2
 [`sha3`]: https://crates.io/crates/sha3
-[`sodiumoxide`]: https://crates.io/crates/sodiumoxide
 [`x25519-dalek`]: https://crates.io/crates/x25519-dalek
 [`xsalsa20poly1305`]: https://crates.io/crates/xsalsa20poly1305
 [`orion`]: https://crates.io/crates/orion
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/advisory-db-20220105/crates/rustc-serialize/RUSTSEC-2022-0004.md 
new/advisory-db-20220215/crates/rustc-serialize/RUSTSEC-2022-0004.md
--- old/advisory-db-20220105/crates/rustc-serialize/RUSTSEC-2022-0004.md        
1970-01-01 01:00:00.000000000 +0100
+++ new/advisory-db-20220215/crates/rustc-serialize/RUSTSEC-2022-0004.md        
2022-02-09 15:34:03.000000000 +0100
@@ -0,0 +1,28 @@
+```toml
+[advisory]
+id = "RUSTSEC-2022-0004"
+package = "rustc-serialize"
+date = "2022-01-01"
+categories = ["denial-of-service"]
+keywords = ["stack overflow"]
+
+[versions]
+patched = []
+
+[affected]
+functions = { "rustc_serialize::json::Json::from_str" = ["*"] }
+```
+
+# Stack overflow in rustc_serialize when parsing deeply nested JSON
+
+When parsing JSON using `json::Json::from_str`, there is no limit to the depth 
of the stack, therefore deeply nested objects can cause a stack overflow, which 
aborts the process.
+
+Example code that triggers the vulnerability is
+
+```rust
+fn main() {
+    let _ = rustc_serialize::json::Json::from_str(&"[0,[".repeat(10000));
+}
+```
+
+[serde](https://crates.io/crates/serde) is recommended as a replacement to 
rustc_serialize.
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/advisory-db-20220105/crates/thread_local/RUSTSEC-2022-0006.md 
new/advisory-db-20220215/crates/thread_local/RUSTSEC-2022-0006.md
--- old/advisory-db-20220105/crates/thread_local/RUSTSEC-2022-0006.md   
1970-01-01 01:00:00.000000000 +0100
+++ new/advisory-db-20220215/crates/thread_local/RUSTSEC-2022-0006.md   
2022-02-09 15:34:03.000000000 +0100
@@ -0,0 +1,18 @@
+```toml
+[advisory]
+id = "RUSTSEC-2022-0006"
+package = "thread_local"
+categories = ["memory-corruption"]
+date = "2022-01-23"
+url = "https://github.com/Amanieu/thread_local-rs/issues/33";
+
+[versions]
+patched = [">= 1.1.4"]
+```
+
+# Data race in `Iter` and `IterMut`
+
+In the affected version of this crate, `{Iter, IterMut}::next` used a weaker 
memory ordering when loading values than what was required, exposing a 
potential data race
+when iterating over a `ThreadLocal`'s values.
+
+Crates using `Iter::next`, or `IterMut::next` are affected by this issue.
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/advisory-db-20220105/crates/tokio/RUSTSEC-2021-0124.md 
new/advisory-db-20220215/crates/tokio/RUSTSEC-2021-0124.md
--- old/advisory-db-20220105/crates/tokio/RUSTSEC-2021-0124.md  2021-12-27 
20:44:42.000000000 +0100
+++ new/advisory-db-20220215/crates/tokio/RUSTSEC-2021-0124.md  2022-02-09 
15:34:03.000000000 +0100
@@ -2,6 +2,7 @@
 [advisory]
 id = "RUSTSEC-2021-0124"
 package = "tokio"
+aliases = ["CVE-2021-45710"]
 date = "2021-11-16"
 url = "https://github.com/tokio-rs/tokio/issues/4225";
 categories = ["memory-corruption", "thread-safety"]
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/advisory-db-20220105/crates/tokio-proto/RUSTSEC-2020-0162.md 
new/advisory-db-20220215/crates/tokio-proto/RUSTSEC-2020-0162.md
--- old/advisory-db-20220105/crates/tokio-proto/RUSTSEC-2020-0162.md    
1970-01-01 01:00:00.000000000 +0100
+++ new/advisory-db-20220215/crates/tokio-proto/RUSTSEC-2020-0162.md    
2022-02-09 15:34:03.000000000 +0100
@@ -0,0 +1,17 @@
+```toml
+[advisory]
+id = "RUSTSEC-2020-0162"
+package = "tokio-proto"
+date = "2020-02-06"
+informational = "unmaintained"
+url = 
"https://github.com/tokio-rs/tokio-proto/commit/56c720ea3c74efa8f39e36c24e609628222b16a1";
+
+[versions]
+patched = []
+unaffected = []
+```
+
+# `tokio-proto` is deprecated/unmaintained
+
+The [`tokio-proto`](https://crates.io/crates/tokio-proto) crate has been 
deprecated, and [its GitHub 
repository](https://github.com/tokio-rs/tokio-proto) has been archived.
+Users may be interested in 
[`tokio-tower`](https://crates.io/crates/tokio-tower) instead, per 
https://github.com/tokio-rs/tokio/issues/118#issuecomment-452969665
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/advisory-db-20220105/crates/tower-http/RUSTSEC-2021-0135.md 
new/advisory-db-20220215/crates/tower-http/RUSTSEC-2021-0135.md
--- old/advisory-db-20220105/crates/tower-http/RUSTSEC-2021-0135.md     
1970-01-01 01:00:00.000000000 +0100
+++ new/advisory-db-20220215/crates/tower-http/RUSTSEC-2021-0135.md     
2022-02-09 15:34:03.000000000 +0100
@@ -0,0 +1,28 @@
+```toml
+[advisory]
+id = "RUSTSEC-2021-0135"
+package = "tower-http"
+date = "2021-01-21"
+url = "https://github.com/tower-rs/tower-http/pull/204";
+categories = ["file-disclosure"]
+keywords = ["directory traversal", "http"]
+
+[affected]
+os = ["windows"]
+
+[versions]
+patched = [">= 0.2.1", ">= 0.1.3, < 0.2.0"]
+```
+
+# Improper validation of Windows paths could lead to directory traversal attack
+
+`tower_http::services::fs::ServeDir` didn't correctly validate Windows paths
+meaning paths like `/foo/bar/c:/windows/web/screen/img101.png` would be allowed
+and respond with the contents of `c:/windows/web/screen/img101.png`. Thus users
+could potentially read files anywhere on the filesystem.
+
+This only impacts Windows. Linux and other unix likes are not impacted by this.
+
+See [tower-http#204] for more details.
+
+[tower-http#204]: https://github.com/tower-rs/tower-http/pull/204
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/advisory-db-20220105/crates/windows/RUSTSEC-2022-0008.md 
new/advisory-db-20220215/crates/windows/RUSTSEC-2022-0008.md
--- old/advisory-db-20220105/crates/windows/RUSTSEC-2022-0008.md        
1970-01-01 01:00:00.000000000 +0100
+++ new/advisory-db-20220215/crates/windows/RUSTSEC-2022-0008.md        
2022-02-09 15:34:03.000000000 +0100
@@ -0,0 +1,23 @@
+```toml
+[advisory]
+id = "RUSTSEC-2022-0008"
+package = "windows"
+date = "2022-01-02"
+url = "https://github.com/microsoft/windows-rs/issues/1409";
+categories = ["memory-corruption", "thread-safety"]
+keywords = []
+informational = "unsound"
+
+[versions]
+patched = [">= 0.32.0"]
+unaffected = ["< 0.1.2"]
+
+[affected]
+os = ["windows"]
+```
+
+# Delegate functions are missing `Send` bound
+
+Affected versions of this crate did not require event handlers to have `Send` 
bound despite there being no guarantee of them being called on any particular 
thread, which can potentially lead to data races and undefined behavior.
+
+The flaw was corrected in commit 
[afe3252](https://github.com/microsoft/windows-rs/commit/afe32525c22209aa8f632a0f4ad607863b51796a)
 by adding `Send` bounds.
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/advisory-db-20220105/rust/std/CVE-2022-21658.md 
new/advisory-db-20220215/rust/std/CVE-2022-21658.md
--- old/advisory-db-20220105/rust/std/CVE-2022-21658.md 1970-01-01 
01:00:00.000000000 +0100
+++ new/advisory-db-20220215/rust/std/CVE-2022-21658.md 2022-02-09 
15:34:03.000000000 +0100
@@ -0,0 +1,20 @@
+```toml
+[advisory]
+id = "CVE-2022-21658"
+package = "std"
+categories = ["file-disclosure"]
+date = "2022-01-16"
+url = "https://blog.rust-lang.org/2022/01/20/cve-2022-21658.html";
+cvss = "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:H"
+
+[affected]
+[affected.functions]
+"std::fs::remove_dir_all" = ["< 1.58.1"]
+
+[versions]
+patched = [">= 1.58.1"]
+```
+
+# Time-of-check time-of-use race condition can allow attacker to delete files 
they do not have access to delete
+
+In the standard library in Rust before 1.58.1, an attacker with unprivileged 
access to a system could trick a privileged program using 
`std::fs::remove_dir_all` into deleting files they don't have access to delete 
by creating a symlink in a directory that would be removed by a 
`std::fs::remove_dir_all` call due to a Time-of-check time-of-use race 
condition around this function's check for symbolic links. The function should 
remove the symbolic links rather than recursively deleting the linked file or 
directory.

Reply via email to