-
-
Notifications
You must be signed in to change notification settings - Fork 2.5k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
tokio v0.1.22 uses vulnerable crates #1345
Comments
See crossbeam-rs/crossbeam#395, crossbeam-rs/crossbeam#402 and pending crossbeam-epoch release in crossbeam-rs/crossbeam#401. |
@yaa110 what action do you expect to be taken based on this issue? |
@carllerche |
@yaa110 updating dependencies is transparent to end users once it is released. |
I'm enquiring if this will be released as crossbeam-epoch-0.7.2 (transparent PATCH update for tokio users) or 0.8.0 (MINOR releases). If its only the later, then tokio will require version bumps. FWIW, I have some other changes I'd like to backport here to v0.1.x, and my proposal for that is now awaiting an answer regarding crossbeam. |
@dekellum what items are you looking to backport? I think it may be a good idea to give 0.1 a bump anyways. |
crossbeam-epoch-0.7.2 was just released with memoffset 0.5. dep, so tokio users get this fix with a |
@dekellum Thanks for following up 👍 closing this now. |
Version
Platform
Linux username 5.2.1-arch1-1-ARCH #1 SMP PREEMPT Sun Jul 14 14:52:52 UTC 2019 x86_64 GNU/Linux
Subcrates
Description
Please run
cargo audit
:The text was updated successfully, but these errors were encountered: