Script 'mail_helper' called by obssrc
Hello community,

here is the log from the commit of package cargo-audit-advisory-db for 
openSUSE:Factory checked in at 2022-05-17 17:24:31
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Factory/cargo-audit-advisory-db (Old)
 and      /work/SRC/openSUSE:Factory/.cargo-audit-advisory-db.new.1538 (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Package is "cargo-audit-advisory-db"

Tue May 17 17:24:31 2022 rev:25 rq:977631 version:20220511

Changes:
--------
--- 
/work/SRC/openSUSE:Factory/cargo-audit-advisory-db/cargo-audit-advisory-db.changes
  2022-05-01 18:53:56.423182545 +0200
+++ 
/work/SRC/openSUSE:Factory/.cargo-audit-advisory-db.new.1538/cargo-audit-advisory-db.changes
        2022-05-17 17:24:49.875192613 +0200
@@ -1,0 +2,15 @@
+Wed May 11 01:12:29 UTC 2022 - wbr...@suse.de
+
+- Update to version 20220511:
+  * Assigned RUSTSEC-2022-0022 to hyper (#1235)
+  * add hyper advisory (#1232)
+  * Assigned RUSTSEC-2022-0019 to crossbeam-channel, RUSTSEC-2022-0020 to 
crossbeam, RUSTSEC-2022-0021 to crossbeam-queue (#1233)
+  * add crossbeam advisories for incorrect (unsound) zeroed memory (#1231)
+  * Assigned RUSTSEC-2022-0018 to totp-rs (#1230)
+  * Possible timing attack in totp-rs (#1229)
+  * HOWTO_UNMAINTAINED.md: guide for unmaintained crate advisories (#1192)
+  * Assigned RUSTSEC-2022-0017 to array-macro (#1225)
+  * Add advisory for using impure constants in array-macro (#1224)
+  * Add patch version for fruity (#1223)
+
+-------------------------------------------------------------------

Old:
----
  advisory-db-20220428.tar.xz

New:
----
  advisory-db-20220511.tar.xz

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Other differences:
------------------
++++++ cargo-audit-advisory-db.spec ++++++
--- /var/tmp/diff_new_pack.FDlIPU/_old  2022-05-17 17:24:50.367193059 +0200
+++ /var/tmp/diff_new_pack.FDlIPU/_new  2022-05-17 17:24:50.371193062 +0200
@@ -17,7 +17,7 @@
 
 
 Name:           cargo-audit-advisory-db
-Version:        20220428
+Version:        20220511
 Release:        0
 Summary:        A database of known security issues for Rust depedencies
 License:        CC0-1.0

++++++ _service ++++++
--- /var/tmp/diff_new_pack.FDlIPU/_old  2022-05-17 17:24:50.399193088 +0200
+++ /var/tmp/diff_new_pack.FDlIPU/_new  2022-05-17 17:24:50.403193091 +0200
@@ -2,7 +2,7 @@
   <service mode="disabled" name="obs_scm">
     <param name="url">https://github.com/RustSec/advisory-db.git</param>
     <param name="scm">git</param>
-    <param name="version">20220428</param>
+    <param name="version">20220511</param>
     <param name="revision">master</param>
     <param name="changesgenerate">enable</param>
     <param name="changesauthor">wbr...@suse.de</param>

++++++ advisory-db-20220428.tar.xz -> advisory-db-20220511.tar.xz ++++++
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/advisory-db-20220428/.duplicate-id-guard 
new/advisory-db-20220511/.duplicate-id-guard
--- old/advisory-db-20220428/.duplicate-id-guard        2022-04-27 
21:05:18.000000000 +0200
+++ new/advisory-db-20220511/.duplicate-id-guard        2022-05-10 
20:45:40.000000000 +0200
@@ -1,3 +1,3 @@
 This file causes merge conflicts if two ID assignment jobs run concurrently.
 This prevents duplicate ID assignment due to a race between those jobs.
-05211b923d19475817ba8c9cdcc1c8079a94da53ed993f4f5af9e032b8766a4d  -
+eb98d17e9f1902d45fd686ac89031f87ceba5a8b5c34ffca8708f1998e703ad5  -
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/advisory-db-20220428/HOWTO_UNMAINTAINED.md 
new/advisory-db-20220511/HOWTO_UNMAINTAINED.md
--- old/advisory-db-20220428/HOWTO_UNMAINTAINED.md      1970-01-01 
01:00:00.000000000 +0100
+++ new/advisory-db-20220511/HOWTO_UNMAINTAINED.md      2022-05-10 
20:45:40.000000000 +0200
@@ -0,0 +1,80 @@
+# HOWTO Guide: Unmaintained Crate Advisories
+
+This document describes the policy for adding advisories for unmaintained
+crates to the [RustSec Advisory Database].
+
+These advisories serve to inform the Rust community about both the existence
+of unmaintained crates within a particular project, and also serve to guide
+switching to maintained alternatives.
+
+## Definition of an "unmaintained" crate
+
+We consider crates unmaintained when they fall into either of the following
+categories:
+
+- Explicitly unmaintained: a crate's author has declared that they are no
+  longer maintaining a particular crate.
+- Implicitly unmaintained: the author is incommunicado for a prolonged period
+  of time and cannot advise as to a crate's status.
+
+## Creating an unmaintained crate advisory
+
+### Policy
+
+When in doubt, we always defer to the author of a crate's discretion as to
+whether they would prefer an unmaintained crate advisory be filed, provided
+we are able to make contact.
+
+First and foremost: *ASK THE AUTHOR(S)*, preferably in a public issue on the
+project's source code repository. If an author/maintainer of a particular crate
+thinks filing an unmaintained crate advisory is a good idea, then great! Go 
ahead.
+
+If the author is responsive and declares that the project *is* maintained, then
+the RustSec organization considers it maintained and won't accept advisories 
about its maintenance status. Again, when in doubt, defer
+to the author's discretion. So long as the author is responsive and avows that
+a crate is maintained, we take them at their word. Repository metrics like
+recent commits, open issues, latest release, etc are not reasons to go against
+the direct word of a crate author.
+
+However, if attempts have been made to contact a crate author have failed,
+metrics like recent commits, open issues, time since last crate release etc
+are important evidence to justify that a crate is unmaintained. An
+incommunicado crate author is irrelevant if there is evidence that work is
+continuing to happen on a crate.
+
+To justify the "implicitly unmaintained" status, where a crate author is
+unreachable, the following criteria must be met:
+
+- Stale repository: no recent maintenance activity, including any of the
+  following: recent commits, responses from the author on open issues,
+  crate releases, or other publically visible activity by the author.
+  Inactivity over a period of 1 year or more is the preferred threshold.
+- Contact attempts with the author made with no response. Ideally these
+  attempts are made via a public GitHub issue, so that issue can be
+  cited in an unmaintained crate advisory if need be. Unresponsiveness
+  by the author over a period of 90 days is suggested before filing an
+  advisory.
+
+### Process
+
+Unmaintained crate advisories use the same structure as RustSec security
+advisories, but include an `informational = "unmaintained"` attribute in
+the TOML advisory.
+
+When creating the advisory, please include a link to an open issue
+on the upstream project repository where the maintenance status has been
+discussed in the `url = "..."` field of the advisory.
+
+For more information on adding an advisory to the RustSec DB, see:
+
+<https://github.com/RustSec/advisory-db/blob/main/CONTRIBUTING.md>
+
+### Questions
+
+Please open a GitHub issue:
+
+<https://github.com/rustsec/advisory-db/issues>
+
+[//]: # (links)
+
+[RustSec Advisory Database]: https://rustsec.org
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/advisory-db-20220428/crates/crossbeam/RUSTSEC-2022-0020.md 
new/advisory-db-20220511/crates/crossbeam/RUSTSEC-2022-0020.md
--- old/advisory-db-20220428/crates/crossbeam/RUSTSEC-2022-0020.md      
1970-01-01 01:00:00.000000000 +0100
+++ new/advisory-db-20220511/crates/crossbeam/RUSTSEC-2022-0020.md      
2022-05-10 20:45:40.000000000 +0200
@@ -0,0 +1,18 @@
+```toml
+[advisory]
+id = "RUSTSEC-2022-0020"
+package = "crossbeam"
+date = "2022-05-10"
+informational = "unsound"
+url = "https://github.com/crossbeam-rs/crossbeam/pull/458";
+
+[versions]
+patched = [">= 0.7.0"]
+```
+
+# `SegQueue` creates zero value of any type
+
+Affected versions of this crate called `mem::zeroed()` to create values of a 
user-supplied type `T`.
+This is unsound e.g. if `T` is a reference type (which must be non-null).
+ 
+The flaw was corrected by avoiding the use of `mem::zeroed()`, using 
`MaybeUninit` instead.
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/advisory-db-20220428/crates/crossbeam-channel/RUSTSEC-2022-0019.md 
new/advisory-db-20220511/crates/crossbeam-channel/RUSTSEC-2022-0019.md
--- old/advisory-db-20220428/crates/crossbeam-channel/RUSTSEC-2022-0019.md      
1970-01-01 01:00:00.000000000 +0100
+++ new/advisory-db-20220511/crates/crossbeam-channel/RUSTSEC-2022-0019.md      
2022-05-10 20:45:40.000000000 +0200
@@ -0,0 +1,18 @@
+```toml
+[advisory]
+id = "RUSTSEC-2022-0019"
+package = "crossbeam-channel"
+date = "2022-05-10"
+informational = "unsound"
+url = "https://github.com/crossbeam-rs/crossbeam/pull/458";
+
+[versions]
+patched = [">= 0.4.3"]
+```
+
+# Channel creates zero value of any type
+
+Affected versions of this crate called `mem::zeroed()` to create values of a 
user-supplied type `T`.
+This is unsound e.g. if `T` is a reference type (which must be non-null).
+ 
+The flaw was corrected by avoiding the use of `mem::zeroed()`, using 
`MaybeUninit` instead.
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/advisory-db-20220428/crates/crossbeam-queue/RUSTSEC-2022-0021.md 
new/advisory-db-20220511/crates/crossbeam-queue/RUSTSEC-2022-0021.md
--- old/advisory-db-20220428/crates/crossbeam-queue/RUSTSEC-2022-0021.md        
1970-01-01 01:00:00.000000000 +0100
+++ new/advisory-db-20220511/crates/crossbeam-queue/RUSTSEC-2022-0021.md        
2022-05-10 20:45:40.000000000 +0200
@@ -0,0 +1,18 @@
+```toml
+[advisory]
+id = "RUSTSEC-2022-0021"
+package = "crossbeam-queue"
+date = "2022-05-10"
+informational = "unsound"
+url = "https://github.com/crossbeam-rs/crossbeam/pull/458";
+
+[versions]
+patched = [">= 0.2.3"]
+```
+
+# `SegQueue` creates zero value of any type
+
+Affected versions of this crate called `mem::zeroed()` to create values of a 
user-supplied type `T`.
+This is unsound e.g. if `T` is a reference type (which must be non-null).
+ 
+The flaw was corrected by avoiding the use of `mem::zeroed()`, using 
`MaybeUninit` instead.
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/advisory-db-20220428/crates/hyper/RUSTSEC-2022-0022.md 
new/advisory-db-20220511/crates/hyper/RUSTSEC-2022-0022.md
--- old/advisory-db-20220428/crates/hyper/RUSTSEC-2022-0022.md  1970-01-01 
01:00:00.000000000 +0100
+++ new/advisory-db-20220511/crates/hyper/RUSTSEC-2022-0022.md  2022-05-10 
20:45:40.000000000 +0200
@@ -0,0 +1,18 @@
+```toml
+[advisory]
+id = "RUSTSEC-2022-0022"
+package = "hyper"
+date = "2022-05-10"
+informational = "unsound"
+url = "https://github.com/hyperium/hyper/pull/2545";
+
+[versions]
+patched = [">= 0.4.12"]
+```
+
+# Parser creates invalid uninitialized value
+
+Affected versions of this crate called `mem::uninitialized()` in the HTTP1 
parser to create values of type `httparse::Header` (from the `httparse` crate).
+This is unsound, since `Header` contains references and thus must be non-null.
+ 
+The flaw was corrected by avoiding the use of `mem::uninitialized()`, using 
`MaybeUninit` instead.
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/advisory-db-20220428/crates/totp-rs/RUSTSEC-2022-0018.md 
new/advisory-db-20220511/crates/totp-rs/RUSTSEC-2022-0018.md
--- old/advisory-db-20220428/crates/totp-rs/RUSTSEC-2022-0018.md        
1970-01-01 01:00:00.000000000 +0100
+++ new/advisory-db-20220511/crates/totp-rs/RUSTSEC-2022-0018.md        
2022-05-10 20:45:40.000000000 +0200
@@ -0,0 +1,23 @@
+```toml
+[advisory]
+id = "RUSTSEC-2022-0018"
+package = "totp-rs"
+date = "2022-05-09"
+url = 
"https://github.com/constantoine/totp-rs/security/advisories/GHSA-8vxv-2g8p-2249";
+categories = ["crypto-failure"]
+cvss = "CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:N/A:N"
+keywords = ["side-channel", "timing-attack"]
+aliases = ["CVE-2022-29185"]
+
+[affected.functions]
+"totp_rs::TOTP::check" = ["< 1.1.0"]
+
+[versions]
+patched = [">= 1.1.0"]
+```
+
+# Timing attack
+
+Affecting versions did not compare tokens in constant time, which could make 
it possible for an attacker to guess the 2fa token of a user.
+
+This has been fixed by using using the crate constant_time_eq for comparison.

Reply via email to