This project might be open to known security vulnerabilities, which can be prevented by tightening the version range of affected dependencies. Find detailed information at the bottom.

Crate calamine

Dependencies

(10 total, 1 outdated, 2 possibly insecure)

CrateRequiredLatestStatus
 atoi_simd^0.160.16.0up to date
 byteorder^1.51.5.0up to date
 chrono ⚠️^0.40.4.41maybe insecure
 codepage^0.1.10.1.2up to date
 encoding_rs^0.80.8.35up to date
 fast-float2 ⚠️^0.20.2.3maybe insecure
 log^0.40.4.27up to date
 quick-xml^0.370.37.5up to date
 serde^1.01.0.219up to date
 zip~2.5.02.6.1out of date

Dev dependencies

(5 total, 1 outdated)

CrateRequiredLatestStatus
 env_logger^0.110.11.8up to date
 glob^0.30.3.2up to date
 rstest^0.21.00.25.0out of date
 serde_derive^1.01.0.219up to date
 sha2^0.10.80.10.9up to date

Security Vulnerabilities

chrono: Potential segfault in `localtime_r` invocations

RUSTSEC-2020-0159

Impact

Unix-like operating systems may segfault due to dereferencing a dangling pointer in specific circumstances. This requires an environment variable to be set in a different thread than the affected functions. This may occur without the user's knowledge, notably in a third-party library.

Workarounds

No workarounds are known.

References

fast-float2: Segmentation fault due to lack of bound check

RUSTSEC-2025-0002

In this case, the "fast_float2::common::AsciiStr::first" method within the "AsciiStr" struct uses the unsafe keyword to reading from memory without performing bounds checking. Specifically, it directly dereferences a pointer offset by "self.ptr". Because of the above reason, the method accesses invalid memory address when it takes an empty string as its input. This approach violates Rust’s memory safety guarantees, as it can lead to invalid memory access if empty buffer is provided.