This project contains known security vulnerabilities. Find detailed information at the bottom.

Crate grin

Dependencies

(20 total, 12 outdated, 1 insecure, 1 possibly insecure)

CrateRequiredLatestStatus
 blake2-rfc^0.20.2.18up to date
 chrono ⚠️^0.4.40.4.38maybe insecure
 clap^2.314.5.4out of date
 ctrlc^3.13.4.4up to date
 cursive^0.120.20.0out of date
 failure^0.10.1.8up to date
 failure_derive^0.10.1.8up to date
 grin_api^1.1.05.3.0out of date
 grin_config^1.1.05.3.0out of date
 grin_core^1.1.05.3.0out of date
 grin_keychain^1.1.05.3.0out of date
 grin_p2p^1.1.05.3.0out of date
 grin_servers^1.1.05.3.0out of date
 grin_util^1.1.05.3.0out of date
 humansize^1.1.02.1.3out of date
 log^0.40.4.21up to date
 pancurses ⚠️^0.16.00.17.0insecure
 serde^11.0.198up to date
 serde_json^11.0.116up to date
 term^0.50.7.0out of date

Dev dependencies

(2 total, 2 outdated)

CrateRequiredLatestStatus
 grin_chain^1.1.05.3.0out of date
 grin_store^1.1.05.3.0out of date

Security Vulnerabilities

pancurses: Format string vulnerabilities in `pancurses`

RUSTSEC-2019-0005

pancurses::mvprintw and pancurses::printw passes a pointer from a rust &str to C, allowing hostile input to execute a format string attack, which trivially allows writing arbitrary data to stack memory.

chrono: Potential segfault in `localtime_r` invocations

RUSTSEC-2020-0159

Impact

Unix-like operating systems may segfault due to dereferencing a dangling pointer in specific circumstances. This requires an environment variable to be set in a different thread than the affected functions. This may occur without the user's knowledge, notably in a third-party library.

Workarounds

No workarounds are known.

References