Affected versions of this crate did not properly check for recursion while deserializing aliases.
This allows an attacker to make a YAML file with an alias referring to itself causing an abort.
The flaw was corrected by checking the recursion depth.
This project might be open to known security vulnerabilities, which can be prevented by tightening the version range of affected dependencies. Find detailed information at the bottom.
dqcsim(28 total, 19 outdated, 3 possibly insecure)
| Crate | Required | Latest | Status |
|---|---|---|---|
| ansi_term | ^0.11 | 0.12.1 | out of date |
| backtrace | ^0.3 | 0.3.76 | up to date |
| clap | ^2.33 | 4.5.50 | out of date |
| crossbeam-channel | ^0.3 | 0.5.15 | out of date |
| failure | ^0.1 | 0.1.8 | up to date |
| git-testament | ^0.1 | 0.2.6 | out of date |
| humantime | ^1.2 | 2.3.0 | out of date |
| ipc-channel | ^0.12 | 0.20.2 | out of date |
| is_executable | ^0.1 | 1.0.5 | out of date |
| lazy_static | ^1.3 | 1.5.0 | up to date |
| libc | ^0.2 | 0.2.177 | up to date |
| named_type | ^0.2 | 0.2.2 | up to date |
| named_type_derive | ^0.2 | 0.2.2 | up to date |
| num-complex | ^0.2 | 0.4.6 | out of date |
| pathdiff | ^0.1 | 0.2.3 | out of date |
| rand | ^0.6 | 0.9.2 | out of date |
| rand_chacha | ^0.1 | 0.9.0 | out of date |
| ref_thread_local | ^0.0 | 0.1.1 | out of date |
| serde | ^1.0 | 1.0.228 | up to date |
| serde-transcode | ^1.1 | 1.1.1 | up to date |
| serde_cbor ⚠️ | ^0.9 | 0.11.2 | out of date |
| serde_json | ^1.0 | 1.0.145 | up to date |
| serde_yaml ⚠️ | ^0.8 | 0.9.34+deprecated | out of date |
| structopt | ^0.2 | 0.3.26 | out of date |
| strum | ^0.15 | 0.27.2 | out of date |
| strum_macros | ^0.15 | 0.27.2 | out of date |
| term | ^0.5 | 1.2.0 | out of date |
| whoami ⚠️ | ^0.5 | 1.6.1 | out of date |
serde_yaml: Uncontrolled recursion leads to abort in deserializationAffected versions of this crate did not properly check for recursion while deserializing aliases.
This allows an attacker to make a YAML file with an alias referring to itself causing an abort.
The flaw was corrected by checking the recursion depth.
serde_cbor: Flaw in CBOR deserializer allows stack overflowAffected versions of this crate did not properly check if semantic tags were nested excessively during deserialization.
This allows an attacker to craft small (< 1 kB) CBOR documents that cause a stack overflow.
The flaw was corrected by limiting the allowed number of nested tags.
whoami: Stack buffer overflow with whoami on several Unix platformsWith versions of the whoami crate >= 0.5.3 and < 1.5.0, calling any of these functions leads to an immediate stack buffer overflow on illumos and Solaris:
whoami::usernamewhoami::realnamewhoami::username_oswhoami::realname_osWith versions of the whoami crate >= 0.5.3 and < 1.0.1, calling any of the above functions also leads to a stack buffer overflow on these platforms:
This occurs because of an incorrect definition of the passwd struct on those platforms.
As a result of this issue, denial of service and data corruption have both been observed in the wild. The issue is possibly exploitable as well.
This vulnerability also affects other Unix platforms that aren't Linux or macOS.
This issue has been addressed in whoami 1.5.0.
For more information, see this GitHub issue.