This project might be open to known security vulnerabilities, which can be prevented by tightening the version range of affected dependencies. Find detailed information at the bottom.

Crate caelum-vcdm

Dependencies

(12 total, 5 outdated, 2 possibly insecure)

CrateRequiredLatestStatus
 base64^0.100.22.0out of date
 bytes^0.41.6.0out of date
 chrono ⚠️^0.4.90.4.38maybe insecure
 ed25519-dalek ⚠️^1.0.0-pre.22.1.1out of date
 hex^0.40.4.3up to date
 linked-hash-map^0.50.5.6up to date
 rand_core^0.5.10.6.4out of date
 serde^1.01.0.198up to date
 serde_json^1.01.0.116up to date
 sha2^0.80.10.8out of date
 stdweb^0.4.200.4.20up to date
 wasm-bindgen^0.20.2.92up to date

Dev dependencies

(2 total, 2 outdated)

CrateRequiredLatestStatus
 rand_core^0.5.10.6.4out of date
 wasm-bindgen-test^0.20.3.42out of date

Security Vulnerabilities

chrono: Potential segfault in `localtime_r` invocations

RUSTSEC-2020-0159

Impact

Unix-like operating systems may segfault due to dereferencing a dangling pointer in specific circumstances. This requires an environment variable to be set in a different thread than the affected functions. This may occur without the user's knowledge, notably in a third-party library.

Workarounds

No workarounds are known.

References

ed25519-dalek: Double Public Key Signing Function Oracle Attack on `ed25519-dalek`

RUSTSEC-2022-0093

Versions of ed25519-dalek prior to v2.0 model private and public keys as separate types which can be assembled into a Keypair, and also provide APIs for serializing and deserializing 64-byte private/public keypairs.

Such APIs and serializations are inherently unsafe as the public key is one of the inputs used in the deterministic computation of the S part of the signature, but not in the R value. An adversary could somehow use the signing function as an oracle that allows arbitrary public keys as input can obtain two signatures for the same message sharing the same R and only differ on the S part.

Unfortunately, when this happens, one can easily extract the private key.

Revised public APIs in v2.0 of ed25519-dalek do NOT allow a decoupled private/public keypair as signing input, except as part of specially labeled "hazmat" APIs which are clearly labeled as being dangerous if misused.