File tree 4 files changed +47
-47
lines changed
4 files changed +47
-47
lines changed Original file line number Diff line number Diff line change 1
1
This file causes merge conflicts if two ID assignment jobs run concurrently.
2
2
This prevents duplicate ID assignment due to a race between those jobs.
3
- 54e570a3af4cf3373d3167584f6ba074f9a490041e0ceebf7eeeeda71c7eba9f -
3
+ fc3307516f0bba62f1990827568056f2ca57badabb319fa9a8b952b1e9ecda48 -
Original file line number Diff line number Diff line change 1
1
``` toml
2
2
[advisory ]
3
- id = " RUSTSEC-0000-0000 "
3
+ id = " RUSTSEC-2024-0404 "
4
4
package = " anstream"
5
5
date = " 2024-09-08"
6
6
url = " https://github.com/rust-cli/anstyle/issues/156"
Original file line number Diff line number Diff line change 1
- ``` toml
2
- [advisory ]
3
- id = " RUSTSEC-0000-0000 "
4
- package = " js-sandbox"
5
- date = " 2024-07-18"
6
- url = " https://github.com/Bromeon/js-sandbox/issues/31"
7
- categories = [" denial-of-service" ]
8
-
9
- [versions ]
10
- patched = []
11
- ```
12
-
13
- # op_panic in the base runtime can force a panic in the runtime's containing thread
14
-
15
- Affected versions use deno_core releases that expose ` Deno.core.ops.op_panic ` to the JS runtime in the base core
16
-
17
- This function when called triggers a manual panic in the thread containing the runtime, breaking sandboxing
18
-
19
- It can be fixed by stubbing out the exposed op:
20
- ``` javascript
21
- Deno .core .ops .op_panic = (msg ) => { throw new Error (msg) };
22
- ```
1
+ ``` toml
2
+ [advisory ]
3
+ id = " RUSTSEC-2024-0403 "
4
+ package = " js-sandbox"
5
+ date = " 2024-07-18"
6
+ url = " https://github.com/Bromeon/js-sandbox/issues/31"
7
+ categories = [" denial-of-service" ]
8
+
9
+ [versions ]
10
+ patched = []
11
+ ```
12
+
13
+ # op_panic in the base runtime can force a panic in the runtime's containing thread
14
+
15
+ Affected versions use deno_core releases that expose ` Deno.core.ops.op_panic ` to the JS runtime in the base core
16
+
17
+ This function when called triggers a manual panic in the thread containing the runtime, breaking sandboxing
18
+
19
+ It can be fixed by stubbing out the exposed op:
20
+ ``` javascript
21
+ Deno .core .ops .op_panic = (msg ) => { throw new Error (msg) };
22
+ ```
Original file line number Diff line number Diff line change 1
- ``` toml
2
- [advisory ]
3
- id = " RUSTSEC-0000-0000 "
4
- package = " rustyscript"
5
- date = " 2024-07-18"
6
- url = " https://github.com/rscarson/rustyscript/issues/174"
7
- categories = [" denial-of-service" ]
8
-
9
- [versions ]
10
- patched = [" >= 0.6.1" ]
11
- unaffected = [" <= 0.3.0" ]
12
- ```
13
-
14
- # op_panic in the base runtime can force a panic in the runtime's containing thread
15
-
16
- Affected versions use deno_core releases that expose ` Deno.core.ops.op_panic ` to the JS runtime in the base core
17
-
18
- This function when called triggers a manual panic in the thread containing the runtime.
19
-
20
- It can be fixed by stubbing out the exposed op:
21
- ``` javascript
22
- Deno .core .ops .op_panic = (msg ) => { throw new Error (msg) };
23
- ```
1
+ ``` toml
2
+ [advisory ]
3
+ id = " RUSTSEC-2024-0405 "
4
+ package = " rustyscript"
5
+ date = " 2024-07-18"
6
+ url = " https://github.com/rscarson/rustyscript/issues/174"
7
+ categories = [" denial-of-service" ]
8
+
9
+ [versions ]
10
+ patched = [" >= 0.6.1" ]
11
+ unaffected = [" <= 0.3.0" ]
12
+ ```
13
+
14
+ # op_panic in the base runtime can force a panic in the runtime's containing thread
15
+
16
+ Affected versions use deno_core releases that expose ` Deno.core.ops.op_panic ` to the JS runtime in the base core
17
+
18
+ This function when called triggers a manual panic in the thread containing the runtime.
19
+
20
+ It can be fixed by stubbing out the exposed op:
21
+ ``` javascript
22
+ Deno .core .ops .op_panic = (msg ) => { throw new Error (msg) };
23
+ ```
You can’t perform that action at this time.
0 commit comments