This project might be open to known security vulnerabilities, which can be prevented by tightening the version range of affected dependencies. Find detailed information at the bottom.

Crate distill-daemon

Dependencies

(29 total, 16 outdated, 3 possibly insecure)

CrateRequiredLatestStatus
 async-channel^1.42.3.1out of date
 async-lock^2.13.3.0out of date
 bincode^1.3.11.3.3up to date
 capnp ⚠️^0.14.00.19.5out of date
 capnp-rpc^0.14.00.19.1out of date
 chrono ⚠️^0.4.190.4.38maybe insecure
 distill-core=0.0.20.0.3out of date
 distill-downstream-lmdb-rkv^0.11.0-windows-fixN/Aup to date
 distill-importer=0.0.20.0.3out of date
 distill-loader=0.0.20.0.3out of date
 distill-schema=0.0.20.0.3out of date
 dunce^1.01.0.4up to date
 erased-serde^0.30.4.5out of date
 event-listener^2.4.05.3.0out of date
 fern^0.6.00.6.2up to date
 futures^0.30.3.30up to date
 log^0.40.4.21up to date
 notify^4.0.156.1.1out of date
 num_cpus^1.101.16.0up to date
 path-clean^0.11.0.1out of date
 path-slash^0.1.10.2.1out of date
 pin-project^1.01.1.5up to date
 rayon^1.31.10.0up to date
 ron^0.6.40.8.1out of date
 serde^11.0.202up to date
 serde_derive^1.01.0.202up to date
 tokio ⚠️^1.01.37.0maybe insecure
 tokio-util^0.6.10.7.11out of date
 uuid^0.8.21.8.0out of date

Dev dependencies

(1 total, all up-to-date)

CrateRequiredLatestStatus
 tempfile^3.2.03.10.1up to date

Security Vulnerabilities

chrono: Potential segfault in `localtime_r` invocations

RUSTSEC-2020-0159

Impact

Unix-like operating systems may segfault due to dereferencing a dangling pointer in specific circumstances. This requires an environment variable to be set in a different thread than the affected functions. This may occur without the user's knowledge, notably in a third-party library.

Workarounds

No workarounds are known.

References

capnp: out-of-bounds read possible when setting list-of-pointers

RUSTSEC-2022-0068

If a message consumer expects data of type "list of pointers", and if the consumer performs certain specific actions on such data, then a message producer can cause the consumer to read out-of-bounds memory. This could trigger a process crash in the consumer, or in some cases could allow exfiltration of private in-memory data.

The C++ Cap'n Proto library is also affected by this bug. See the advisory on the main Cap'n Proto repo for a succinct description of the exact circumstances in which the problem can arise.

tokio: reject_remote_clients Configuration corruption

RUSTSEC-2023-0001

On Windows, configuring a named pipe server with pipe_mode will force ServerOptions::reject_remote_clients as false.

This drops any intended explicit configuration for the reject_remote_clients that may have been set as true previously.

The default setting of reject_remote_clients is normally true meaning the default is also overridden as false.

Workarounds

Ensure that pipe_mode is set first after initializing a ServerOptions. For example:

let mut opts = ServerOptions::new();
opts.pipe_mode(PipeMode::Message);
opts.reject_remote_clients(true);