Skip to content

Update Rust crate zerocopy to v0.6.6 [SECURITY]#42

Open
renovate[bot] wants to merge 1 commit intomainfrom
renovate/crate-zerocopy-vulnerability
Open

Update Rust crate zerocopy to v0.6.6 [SECURITY]#42
renovate[bot] wants to merge 1 commit intomainfrom
renovate/crate-zerocopy-vulnerability

Conversation

@renovate
Copy link
Contributor

@renovate renovate bot commented Dec 15, 2023

This PR contains the following updates:

Package Type Update Change
zerocopy dependencies patch 0.6.10.6.6

GitHub Vulnerability Alerts

GHSA-3mv5-343c-w2qg

This advisory is also published as RUSTSEC-2023-0074.

The Ref methods into_ref, into_mut, into_slice, and into_slice_mut are unsound and may allow safe code to exhibit undefined behavior when used with Ref<B, T> where B is cell::Ref or cell::RefMut. Note that these methods remain sound when used with B types other than cell::Ref or cell::RefMut.

See https://github.com/google/zerocopy/issues/716 for a more in-depth analysis.

The current plan is to yank the affected versions soon. See https://github.com/google/zerocopy/issues/679 for more detail.

GHSA-rjhf-4mh8-9xjq

The Ref methods into_ref, into_mut, into_slice, and into_slice_mut are unsound and may allow safe code to exhibit undefined behavior when used with Ref<B, T> where B is cell::Ref or cell::RefMut. Note that these methods remain sound when used with B types other than cell::Ref or cell::RefMut.

See https://github.com/google/zerocopy/issues/716 for a more in-depth analysis.

The current plan is to yank the affected versions soon. See https://github.com/google/zerocopy/issues/679 for more detail.


Release Notes

google/zerocopy (zerocopy)

v0.6.6

Compare Source

This release fixes the soundness issue described in #​716. The affected versions will soon be yanked.

This release is also described in security advisories RUSTSEC-2023-0074 and GHSA-3mv5-343c-w2qg.

What's Changed

Full Changelog: google/zerocopy@v0.6.5...v0.6.6

v0.6.5

Compare Source

Security advisories for this bug have been published as
RUSTSEC-2023-0074 and GHSA-3mv5-343c-w2qg.

In these versions, the Ref methods into_ref, into_mut, into_slice, and
into_mut_slice were permitted in combination with the standard library
cell::Ref and cell::RefMut types for Ref<B, T>'s B type parameter. These
combinations are unsound, and may permit safe code to exhibit undefined
behavior. Fixes have been published to each affected minor version which do not
permit this code to compile.

See #​716 for more details.

v0.6.4

Compare Source

What's Changed

Full Changelog: google/zerocopy@v0.6.3...v0.6.4

v0.6.3

Compare Source

What's Changed

Full Changelog: google/zerocopy@v0.6.2...v0.6.3

v0.6.2

Compare Source

What's Changed

Full Changelog: google/zerocopy@v0.6.1...v0.6.2


Configuration

📅 Schedule: Branch creation - "" in timezone America/Los_Angeles, Automerge - "after 8pm,before 6am" in timezone America/Los_Angeles.

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR is behind base branch, or you tick the rebase/retry checkbox.

🔕 Ignore: Close this PR and you won't be reminded about this update again.


  • If you want to rebase/retry this PR, check this box

This PR was generated by Mend Renovate. View the repository job log.

@renovate renovate bot force-pushed the renovate/crate-zerocopy-vulnerability branch from 985770d to 836702b Compare April 11, 2024 17:40
@renovate renovate bot changed the title chore(deps): update rust crate zerocopy to v0.6.6 [security] Update Rust crate zerocopy to v0.6.6 [SECURITY] Apr 26, 2024
@renovate renovate bot force-pushed the renovate/crate-zerocopy-vulnerability branch 5 times, most recently from fb518c3 to 3be141a Compare January 29, 2025 20:52
@renovate renovate bot force-pushed the renovate/crate-zerocopy-vulnerability branch from 3be141a to eaefa29 Compare March 5, 2025 18:57
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Projects

None yet

Development

Successfully merging this pull request may close these issues.

0 participants