This project contains known security vulnerabilities. Find detailed information at the bottom.

Crate econf

Dependencies

(5 total, 3 outdated, 1 insecure, 1 possibly insecure)

CrateRequiredLatestStatus
 econf-derive^0.2.10.3.0out of date
 log^0.40.4.27up to date
 parse_duration ⚠️^1.02.1.1insecure
 serde^1.01.0.219up to date
 serde_yaml ⚠️^0.80.9.34+deprecatedout of date

Dev dependencies

(1 total, 1 outdated)

CrateRequiredLatestStatus
 simple_logger^0.55.0.0out of date

Security Vulnerabilities

serde_yaml: Uncontrolled recursion leads to abort in deserialization

RUSTSEC-2018-0005

Affected versions of this crate did not properly check for recursion while deserializing aliases.

This allows an attacker to make a YAML file with an alias referring to itself causing an abort.

The flaw was corrected by checking the recursion depth.

parse_duration: Denial of service through parsing payloads with too big exponent

RUSTSEC-2021-0041

The parse_duration::parse function allows for parsing duration strings with exponents like 5e5s where under the hood, the BigInt type along with the pow function are used for such payloads. Passing an arbitrarily big exponent makes the parse_duration::parse function to process the payload for a very long time taking up CPU and memory.

This allows an attacker to cause a DoS if the parse_duration::parse function is used to process untrusted input.