X-Git-Url: https://git.lizzy.rs/?a=blobdiff_plain;f=RELEASES.md;h=91e3c5f721952a65c0b4ddf2a9b269c0d293f732;hb=3b6e8ed502e351d5d8daa3ac0c61a4e44b428d98;hp=c50e5b2236fed3183e79caad0ac61eb0e45143cb;hpb=7c564fcc2b0d978d89ace7e049a92504cb8ddc71;p=rust.git diff --git a/RELEASES.md b/RELEASES.md index c50e5b2236f..91e3c5f7219 100644 --- a/RELEASES.md +++ b/RELEASES.md @@ -99,9 +99,10 @@ Version 1.34.2 (2019-05-14) =========================== * [Destabilize the `Error::type_id` function due to a security - vulnerability][60785] + vulnerability][60785] ([CVE-2019-12083]) [60785]: https://github.com/rust-lang/rust/pull/60785 +[CVE-2019-12083]: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12083 Version 1.34.1 (2019-04-25) =========================== @@ -156,7 +157,7 @@ Libraries produce a warning if their returning type is unused. - [The methods `checked_pow`, `saturating_pow`, `wrapping_pow`, and `overflowing_pow` are now available for all numeric types.][57873] These are - equivalvent to methods such as `wrapping_add` for the `pow` operation. + equivalent to methods such as `wrapping_add` for the `pow` operation. Stabilized APIs