Date: Thu, 3 Feb 2022 14:07:56 GMT From: Tobias Kortkamp <tobik@FreeBSD.org> To: ports-committers@FreeBSD.org, dev-commits-ports-all@FreeBSD.org, dev-commits-ports-main@FreeBSD.org Subject: git: 99de21f2a15c - main - security/vuxml: Fix recent lang/rust entry Message-ID: <202202031407.213E7ua9097175@gitrepo.freebsd.org>
next in thread | raw e-mail | index | archive | help
The branch main has been updated by tobik: URL: https://cgit.FreeBSD.org/ports/commit/?id=99de21f2a15c52fd488b59aaaa418843955f9741 commit 99de21f2a15c52fd488b59aaaa418843955f9741 Author: Tobias Kortkamp <tobik@FreeBSD.org> AuthorDate: 2022-02-03 14:02:33 +0000 Commit: Tobias Kortkamp <tobik@FreeBSD.org> CommitDate: 2022-02-03 14:02:33 +0000 security/vuxml: Fix recent lang/rust entry PR: 261449 --- security/vuxml/vuln-2022.xml | 6 +++++- 1 file changed, 5 insertions(+), 1 deletion(-) diff --git a/security/vuxml/vuln-2022.xml b/security/vuxml/vuln-2022.xml index f619ea9e0a34..ae1795e6eed2 100644 --- a/security/vuxml/vuln-2022.xml +++ b/security/vuxml/vuln-2022.xml @@ -211,10 +211,13 @@ <name>rust</name> <range><lt>1.58.1</lt></range> </package> + <package> + <name>rust-nightly</name> + <range><lt>1.60.0.20220202</lt></range> + </package> </affects> <description> <body xmlns="http://www.w3.org/1999/xhtml"> - <p>SO-AND-SO reports:</p> <blockquote cite="https://blog.rust-lang.org/2022/01/20/cve-2022-21658.html"> <p>The Rust Security Response WG was notified that the std::fs::remove_dir_all standard library function is vulnerable to a @@ -232,6 +235,7 @@ <dates> <discovery>2022-01-20</discovery> <entry>2022-01-31</entry> + <modified>2022-02-03</modified> </dates> </vuln>
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?202202031407.213E7ua9097175>