-
Notifications
You must be signed in to change notification settings - Fork 136
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Handling of pre-release versions #30
Comments
Other relevant issues for this: |
This was fixed upstream in the RustSec crate in https://github.com/RustSec/rustsec-crate/pull/69 however to be fixed in |
tarcieri
added a commit
that referenced
this issue
May 7, 2021
tarcieri
added a commit
that referenced
this issue
May 7, 2021
Add support Cargo.lock `patch` and `root` (fixes #30)
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
I have the master version of cookies-rs as a dependency. Unfortunately cargo-audit lists '0.11.0-dev' as vulnerable even though it seems clearly
>= 0.7.6
.Output
Desired Output
I am not sure. In this case the version is clearly not vulnerable but for the general case I am not too sure.
Take this example:
my-cool-crate
is vulnerable.0.7-dev
is out there0.6
, dev version gets silently fixedIn the end the user would not be warned, although you could argue a wrong advisory is at fault.
This matter probably needs some careful consideration.
Steps to reproduce
cookie = { git = "https://github.com/alexcrichton/cookie-rs.git" }
to dependencies in Cargo.tomlcargo build
andcargo audit
Or alternatively and in case cookies-rs changes its version just pull this repo and run cargo audit.
The text was updated successfully, but these errors were encountered: