This project might be open to known security vulnerabilities, which can be prevented by tightening the version range of affected dependencies. Find detailed information at the bottom.

Crate dqcsim

Dependencies

(29 total, 18 outdated, 3 possibly insecure)

CrateRequiredLatestStatus
 ansi_term^0.120.12.1up to date
 backtrace^0.30.3.71up to date
 clap^2.334.5.4out of date
 crossbeam-channel^0.30.5.12out of date
 failure^0.10.1.8up to date
 float-cmp^0.50.9.0out of date
 git-testament^0.10.2.5out of date
 humantime^1.32.1.0out of date
 ipc-channel^0.120.18.0out of date
 is_executable^0.11.0.1out of date
 lazy_static^1.41.4.0up to date
 libc^0.20.2.153up to date
 named_type^0.20.2.2up to date
 named_type_derive^0.20.2.2up to date
 num-complex^0.20.4.5out of date
 pathdiff^0.10.2.1out of date
 rand^0.70.8.5out of date
 rand_chacha^0.20.3.1out of date
 ref_thread_local^0.00.1.1out of date
 serde^1.01.0.198up to date
 serde-transcode^1.11.1.1up to date
 serde_cbor ⚠️^0.100.11.2out of date
 serde_json^1.01.0.116up to date
 serde_yaml ⚠️^0.80.9.34+deprecatedout of date
 structopt^0.30.3.26up to date
 strum^0.160.26.2out of date
 strum_macros^0.160.26.2out of date
 term^0.60.7.0out of date
 whoami ⚠️^0.61.5.1out of date

Security Vulnerabilities

serde_yaml: Uncontrolled recursion leads to abort in deserialization

RUSTSEC-2018-0005

Affected versions of this crate did not properly check for recursion while deserializing aliases.

This allows an attacker to make a YAML file with an alias referring to itself causing an abort.

The flaw was corrected by checking the recursion depth.

serde_cbor: Flaw in CBOR deserializer allows stack overflow

RUSTSEC-2019-0025

Affected versions of this crate did not properly check if semantic tags were nested excessively during deserialization.

This allows an attacker to craft small (< 1 kB) CBOR documents that cause a stack overflow.

The flaw was corrected by limiting the allowed number of nested tags.

whoami: Stack buffer overflow with whoami on several Unix platforms

RUSTSEC-2024-0020

With versions of the whoami crate >= 0.5.3 and < 1.5.0, calling any of these functions leads to an immediate stack buffer overflow on illumos and Solaris:

  • whoami::username
  • whoami::realname
  • whoami::username_os
  • whoami::realname_os

With versions of the whoami crate >= 0.5.3 and < 1.0.1, calling any of the above functions also leads to a stack buffer overflow on these platforms:

  • Bitrig
  • DragonFlyBSD
  • FreeBSD
  • NetBSD
  • OpenBSD

This occurs because of an incorrect definition of the passwd struct on those platforms.

As a result of this issue, denial of service and data corruption have both been observed in the wild. The issue is possibly exploitable as well.

This vulnerability also affects other Unix platforms that aren't Linux or macOS.

This issue has been addressed in whoami 1.5.0.

For more information, see this GitHub issue.