RUSTSEC-2019-0024

Source
https://rustsec.org/advisories/RUSTSEC-2019-0024
Import Source
https://github.com/rustsec/advisory-db/blob/osv/crates/RUSTSEC-2019-0024.json
JSON Data
https://api.osv.dev/v1/vulns/RUSTSEC-2019-0024
Published
2019-10-08T12:00:00Z
Modified
2022-11-05T17:45:24Z
Summary
Test advisory with associated example crate
Details

This is a test advisory useful for verifying RustSec tooling and vulnerability detection pipelines are working correctly. Aside from the fact that it is filed against an example crate, it is otherwise considered by the Advisory Database itself to be a normal security advisory.

It's filed against rustsec-example-crate, an otherwise completely empty crate with no functionality or code, which has three releases:

  • [v0.0.0] - unaffected by this advisory (but yanked from crates.io)
  • [v0.0.1] - vulnerable according to this advisory
  • [v1.0.0] - patched by this advisory
Database specific
{
    "license": "CC0-1.0"
}
References

Affected packages

crates.io / rustsec-example-crate

Package

Name
rustsec-example-crate
View open source insights on deps.dev
Purl
pkg:cargo/rustsec-example-crate

Affected ranges

Type
SEMVER
Events
Introduced
0.0.1
Fixed
1.0.0

Ecosystem specific

{
    "affected_functions": null,
    "affects": {
        "os": [],
        "functions": [],
        "arch": []
    }
}

Database specific

{
    "cvss": null,
    "informational": null,
    "categories": []
}