Debian Package Tracker
Register | Log in
Subscribe

rust-lock-api

Choose email to subscribe with

general
  • source: rust-lock-api (main)
  • version: 0.4.5-1
  • maintainer: Debian Rust Maintainers (archive) (DMD)
  • uploaders: Wolfgang Silbermayr [DMD] [DM] – Sylvestre Ledru [DMD]
  • arch: any
  • std-ver: 4.5.1
  • VCS: Git (Browse, QA)
versions [more versions can be listed by madison] [old versions available from snapshot.debian.org]
[pool directory]
  • oldstable: 0.1.5-1
  • stable: 0.3.4-1
  • testing: 0.4.5-1
  • unstable: 0.4.5-1
versioned links
  • 0.1.5-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 0.3.4-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 0.4.5-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
binaries
  • librust-lock-api+owning-ref-dev
  • librust-lock-api+serde-dev
  • librust-lock-api-dev
action needed
A new upstream version is available: 0.4.7 high
A new upstream version 0.4.7 is available, you should consider packaging it.
Created: 2022-01-31 Last update: 2022-05-28 22:08
5 security issues in sid high

There are 5 open security issues in sid.

5 important issues:
  • CVE-2020-35910: An issue was discovered in the lock_api crate before 0.4.2 for Rust. A data race can occur because of MappedMutexGuard unsoundness.
  • CVE-2020-35911: An issue was discovered in the lock_api crate before 0.4.2 for Rust. A data race can occur because of MappedRwLockReadGuard unsoundness.
  • CVE-2020-35912: An issue was discovered in the lock_api crate before 0.4.2 for Rust. A data race can occur because of MappedRwLockWriteGuard unsoundness.
  • CVE-2020-35913: An issue was discovered in the lock_api crate before 0.4.2 for Rust. A data race can occur because of RwLockReadGuard unsoundness.
  • CVE-2020-35914: An issue was discovered in the lock_api crate before 0.4.2 for Rust. A data race can occur because of RwLockWriteGuard unsoundness.
Created: 2021-02-19 Last update: 2022-01-20 19:33
5 security issues in bookworm high

There are 5 open security issues in bookworm.

5 important issues:
  • CVE-2020-35910: An issue was discovered in the lock_api crate before 0.4.2 for Rust. A data race can occur because of MappedMutexGuard unsoundness.
  • CVE-2020-35911: An issue was discovered in the lock_api crate before 0.4.2 for Rust. A data race can occur because of MappedRwLockReadGuard unsoundness.
  • CVE-2020-35912: An issue was discovered in the lock_api crate before 0.4.2 for Rust. A data race can occur because of MappedRwLockWriteGuard unsoundness.
  • CVE-2020-35913: An issue was discovered in the lock_api crate before 0.4.2 for Rust. A data race can occur because of RwLockReadGuard unsoundness.
  • CVE-2020-35914: An issue was discovered in the lock_api crate before 0.4.2 for Rust. A data race can occur because of RwLockWriteGuard unsoundness.
Created: 2021-08-15 Last update: 2022-01-20 19:33
5 low-priority security issues in buster low

There are 5 open security issues in buster.

5 issues left for the package maintainer to handle:
  • CVE-2020-35910: (needs triaging) An issue was discovered in the lock_api crate before 0.4.2 for Rust. A data race can occur because of MappedMutexGuard unsoundness.
  • CVE-2020-35911: (needs triaging) An issue was discovered in the lock_api crate before 0.4.2 for Rust. A data race can occur because of MappedRwLockReadGuard unsoundness.
  • CVE-2020-35912: (needs triaging) An issue was discovered in the lock_api crate before 0.4.2 for Rust. A data race can occur because of MappedRwLockWriteGuard unsoundness.
  • CVE-2020-35913: (needs triaging) An issue was discovered in the lock_api crate before 0.4.2 for Rust. A data race can occur because of RwLockReadGuard unsoundness.
  • CVE-2020-35914: (needs triaging) An issue was discovered in the lock_api crate before 0.4.2 for Rust. A data race can occur because of RwLockWriteGuard unsoundness.

You can find information about how to handle these issues in the security team's documentation.

Created: 2021-02-19 Last update: 2022-01-20 19:33
5 low-priority security issues in bullseye low

There are 5 open security issues in bullseye.

5 issues left for the package maintainer to handle:
  • CVE-2020-35910: (needs triaging) An issue was discovered in the lock_api crate before 0.4.2 for Rust. A data race can occur because of MappedMutexGuard unsoundness.
  • CVE-2020-35911: (needs triaging) An issue was discovered in the lock_api crate before 0.4.2 for Rust. A data race can occur because of MappedRwLockReadGuard unsoundness.
  • CVE-2020-35912: (needs triaging) An issue was discovered in the lock_api crate before 0.4.2 for Rust. A data race can occur because of MappedRwLockWriteGuard unsoundness.
  • CVE-2020-35913: (needs triaging) An issue was discovered in the lock_api crate before 0.4.2 for Rust. A data race can occur because of RwLockReadGuard unsoundness.
  • CVE-2020-35914: (needs triaging) An issue was discovered in the lock_api crate before 0.4.2 for Rust. A data race can occur because of RwLockWriteGuard unsoundness.

You can find information about how to handle these issues in the security team's documentation.

Created: 2021-08-14 Last update: 2022-01-20 19:33
Build log checks report 1 warning low
Build log checks report 1 warning
Created: 2018-10-11 Last update: 2018-10-11 12:05
Standards version of the package is outdated. wishlist
The package should be updated to follow the last version of Debian Policy (Standards-Version 4.6.1 instead of 4.5.1).
Created: 2020-01-21 Last update: 2022-05-11 23:25
news
[rss feed]
  • [2022-01-21] rust-lock-api 0.4.5-1 MIGRATED to testing (Debian testing watch)
  • [2021-12-30] Accepted rust-lock-api 0.4.5-1 (source) into unstable (Sylvestre Ledru)
  • [2020-05-06] rust-lock-api 0.3.4-1 MIGRATED to testing (Debian testing watch)
  • [2020-05-04] Accepted rust-lock-api 0.3.4-1 (source) into unstable (Wolfgang Silbermayr)
  • [2020-03-28] rust-lock-api 0.3.3-1 MIGRATED to testing (Debian testing watch)
  • [2020-03-21] rust-lock-api REMOVED from testing (Debian testing watch)
  • [2020-01-14] Accepted rust-lock-api 0.3.3-1 (source) into unstable (Nikos Tsipinakis) (signed by: infinity0@debian.org)
  • [2019-12-01] Accepted rust-lock-api 0.3.2-1 (source) into unstable (Sylvestre Ledru)
  • [2019-09-11] Accepted rust-lock-api 0.3.1-1 (amd64 source) into unstable, unstable (Ximin Luo) (signed by: infinity0@debian.org)
  • [2018-12-11] rust-lock-api 0.1.5-1 MIGRATED to testing (Debian testing watch)
  • [2018-12-06] Accepted rust-lock-api 0.1.5-1 (amd64 source) into unstable (Wolfgang Silbermayr)
  • [2018-10-14] Accepted rust-lock-api 0.1.4-1 (source) into unstable (Sylvestre Ledru)
  • [2018-10-10] Accepted rust-lock-api 0.1.3-1 (source amd64) into unstable, unstable (Sylvestre Ledru)
bugs [bug history graph]
  • all: 1
  • RC: 0
  • I&N: 1
  • M&W: 0
  • F&P: 0
  • patch: 0
links
  • lintian
  • buildd: logs, checks, clang, reproducibility, cross
  • popcon
  • browse source code
  • edit tags
  • other distros
  • security tracker
  • debci
ubuntu Ubuntu logo [Information about Ubuntu for Debian Developers]
  • version: 0.4.5-1

Debian Package Tracker — Copyright 2013-2018 The Distro Tracker Developers
Report problems to the tracker.debian.org pseudo-package in the Debian BTS.
Documentation — Bugs — Git Repository — Contributing