Several memory safety issues have been uncovered in an audit of rusqlite.
See https://github.com/rusqlite/rusqlite/releases/tag/0.23.0 for a complete list.
This project contains known security vulnerabilities. Find detailed information at the bottom.
herbie-lint(6 total, 4 outdated, 1 insecure, 1 possibly insecure)
| Crate | Required | Latest | Status |
|---|---|---|---|
| clippy | ~0.0 | 0.0.302 | up to date |
| itertools | ^0.4.8 | 0.14.0 | out of date |
| rusqlite ⚠️ | ^0.6.0 | 0.37.0 | out of date |
| rustc-serialize ⚠️ | ^0.3.18 | 0.3.25 | insecure |
| toml | ^0.1.27 | 0.9.10+spec-1.1.0 | out of date |
| wait-timeout | ^0.1.2 | 0.2.1 | out of date |
(1 total, 1 outdated)
| Crate | Required | Latest | Status |
|---|---|---|---|
| compiletest_rs | ^0.1.0 | 0.11.2 | out of date |
rusqlite: Various memory safety issuesSeveral memory safety issues have been uncovered in an audit of rusqlite.
See https://github.com/rusqlite/rusqlite/releases/tag/0.23.0 for a complete list.
rustc-serialize: Stack overflow in rustc_serialize when parsing deeply nested JSONWhen parsing JSON using json::Json::from_str, there is no limit to the depth of the stack, therefore deeply nested objects can cause a stack overflow, which aborts the process.
Example code that triggers the vulnerability is
fn main() {
let _ = rustc_serialize::json::Json::from_str(&"[0,[".repeat(10000));
}
serde is recommended as a replacement to rustc_serialize.