Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 3 Feb 2022 14:07:56 GMT
From:      Tobias Kortkamp <tobik@FreeBSD.org>
To:        ports-committers@FreeBSD.org, dev-commits-ports-all@FreeBSD.org, dev-commits-ports-main@FreeBSD.org
Subject:   git: 99de21f2a15c - main - security/vuxml: Fix recent lang/rust entry
Message-ID:  <202202031407.213E7ua9097175@gitrepo.freebsd.org>

next in thread | raw e-mail | index | archive | help
The branch main has been updated by tobik:

URL: https://cgit.FreeBSD.org/ports/commit/?id=99de21f2a15c52fd488b59aaaa418843955f9741

commit 99de21f2a15c52fd488b59aaaa418843955f9741
Author:     Tobias Kortkamp <tobik@FreeBSD.org>
AuthorDate: 2022-02-03 14:02:33 +0000
Commit:     Tobias Kortkamp <tobik@FreeBSD.org>
CommitDate: 2022-02-03 14:02:33 +0000

    security/vuxml: Fix recent lang/rust entry
    
    PR:             261449
---
 security/vuxml/vuln-2022.xml | 6 +++++-
 1 file changed, 5 insertions(+), 1 deletion(-)

diff --git a/security/vuxml/vuln-2022.xml b/security/vuxml/vuln-2022.xml
index f619ea9e0a34..ae1795e6eed2 100644
--- a/security/vuxml/vuln-2022.xml
+++ b/security/vuxml/vuln-2022.xml
@@ -211,10 +211,13 @@
 	<name>rust</name>
 	<range><lt>1.58.1</lt></range>
       </package>
+      <package>
+	<name>rust-nightly</name>
+	<range><lt>1.60.0.20220202</lt></range>
+      </package>
     </affects>
     <description>
       <body xmlns="http://www.w3.org/1999/xhtml">;
-	<p>SO-AND-SO reports:</p>
 	<blockquote cite="https://blog.rust-lang.org/2022/01/20/cve-2022-21658.html">;
 	  <p>The Rust Security Response WG was notified that the
 	    std::fs::remove_dir_all standard library function is vulnerable to a
@@ -232,6 +235,7 @@
     <dates>
       <discovery>2022-01-20</discovery>
       <entry>2022-01-31</entry>
+      <modified>2022-02-03</modified>
     </dates>
   </vuln>
 



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?202202031407.213E7ua9097175>