From df7657d332faaa4b1b3b95dcaefb92d7945a974b Mon Sep 17 00:00:00 2001 From: Tony Arcieri Date: Mon, 27 Jan 2020 07:52:31 -0800 Subject: [PATCH] Fix broken/malformatted outbound links --- crates/rust_sodium/RUSTSEC-2020-0003.toml | 2 +- crates/rustsec-example-crate/RUSTSEC-2019-0024.toml | 4 ++-- 2 files changed, 3 insertions(+), 3 deletions(-) diff --git a/crates/rust_sodium/RUSTSEC-2020-0003.toml b/crates/rust_sodium/RUSTSEC-2020-0003.toml index 27dc9e1fe..bd3b764b9 100644 --- a/crates/rust_sodium/RUSTSEC-2020-0003.toml +++ b/crates/rust_sodium/RUSTSEC-2020-0003.toml @@ -10,7 +10,7 @@ advise in the repository readme that they are looking for someone else to take ownership of it. We recommend you switch to an alternative crate such as: -- [`sodiumoxide`]: https://crates.io/crates/sodiumoxide +- [`sodiumoxide`](https://crates.io/crates/sodiumoxide) """ patched_versions = [] unaffected_versions = ["> 0.10.2"] diff --git a/crates/rustsec-example-crate/RUSTSEC-2019-0024.toml b/crates/rustsec-example-crate/RUSTSEC-2019-0024.toml index b78d21025..fca9ce156 100644 --- a/crates/rustsec-example-crate/RUSTSEC-2019-0024.toml +++ b/crates/rustsec-example-crate/RUSTSEC-2019-0024.toml @@ -14,8 +14,8 @@ itself to be a normal security advisory. It's filed against `rustsec-example-crate`, an otherwise completely empty crate with no functionality or code, which has two releases: -- [v0.0.1]: *vulnerable* according to this advisory -- [v1.0.0]: *patched* by this advisory +- [v0.0.1] - *vulnerable* according to this advisory +- [v1.0.0] - *patched* by this advisory (Technically there is a third release, v0.0.0, which is yanked, but otherwise identical to the v0.0.1 release)