Debian Package Tracker
Register | Log in
Subscribe

rust-rgb

Choose email to subscribe with

general
  • source: rust-rgb (main)
  • version: 0.8.11-1
  • maintainer: Debian Rust Maintainers (archive) (DMD)
  • uploaders: Andrej Shadura [DMD]
  • arch: any
  • std-ver: 4.3.0
  • VCS: Git (Browse, QA)
versions [more versions can be listed by madison] [old versions available from snapshot.debian.org]
[pool directory]
  • oldstable: 0.8.11-1
  • stable: 0.8.11-1
  • testing: 0.8.11-1
  • unstable: 0.8.11-1
versioned links
  • 0.8.11-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
binaries
  • librust-rgb+serde-dev
  • librust-rgb-dev
action needed
A new upstream version is available: 0.8.33 high
A new upstream version 0.8.33 is available, you should consider packaging it.
Created: 2021-05-02 Last update: 2022-08-14 18:35
1 security issue in sid high

There is 1 open security issue in sid.

1 important issue:
  • CVE-2020-25016: A safety violation was discovered in the rgb crate before 0.8.20 for Rust, leading to (for example) dereferencing of arbitrary pointers or disclosure of uninitialized memory. This occurs because structs can be treated as bytes for read and write operations.
Created: 2022-07-04 Last update: 2022-08-01 13:40
1 security issue in bookworm high

There is 1 open security issue in bookworm.

1 important issue:
  • CVE-2020-25016: A safety violation was discovered in the rgb crate before 0.8.20 for Rust, leading to (for example) dereferencing of arbitrary pointers or disclosure of uninitialized memory. This occurs because structs can be treated as bytes for read and write operations.
Created: 2022-07-04 Last update: 2022-08-01 13:40
lintian reports 1 error and 1 warning high
Lintian reports 1 error and 1 warning about this package. You should make the package lintian clean getting rid of them.
Created: 2020-07-29 Last update: 2021-01-27 03:05
1 low-priority security issue in bullseye low

There is 1 open security issue in bullseye.

1 issue left for the package maintainer to handle:
  • CVE-2020-25016: (needs triaging) A safety violation was discovered in the rgb crate before 0.8.20 for Rust, leading to (for example) dereferencing of arbitrary pointers or disclosure of uninitialized memory. This occurs because structs can be treated as bytes for read and write operations.

You can find information about how to handle this issue in the security team's documentation.

Created: 2022-07-04 Last update: 2022-08-01 13:40
Build log checks report 1 warning low
Build log checks report 1 warning
Created: 2019-01-13 Last update: 2019-01-13 03:01
Standards version of the package is outdated. wishlist
The package should be updated to follow the last version of Debian Policy (Standards-Version 4.6.1 instead of 4.3.0).
Created: 2019-07-08 Last update: 2022-05-11 23:24
news
[rss feed]
  • [2020-03-26] rust-rgb 0.8.11-1 MIGRATED to testing (Debian testing watch)
  • [2020-03-24] rust-rgb REMOVED from testing (Debian testing watch)
  • [2019-01-18] rust-rgb 0.8.11-1 MIGRATED to testing (Debian testing watch)
  • [2019-01-12] Accepted rust-rgb 0.8.11-1 (amd64 source) into unstable, unstable (Andrej Shadura)
bugs [bug history graph]
  • all: 1
  • RC: 0
  • I&N: 1
  • M&W: 0
  • F&P: 0
  • patch: 0
links
  • homepage
  • lintian (1, 1)
  • buildd: logs, checks, clang, reproducibility, cross
  • popcon
  • browse source code
  • edit tags
  • other distros
  • security tracker
ubuntu Ubuntu logo [Information about Ubuntu for Debian Developers]
  • version: 0.8.11-1

Debian Package Tracker — Copyright 2013-2018 The Distro Tracker Developers
Report problems to the tracker.debian.org pseudo-package in the Debian BTS.
Documentation — Bugs — Git Repository — Contributing