Several memory safety issues have been uncovered in an audit of rusqlite.
See https://github.com/rusqlite/rusqlite/releases/tag/0.23.0 for a complete list.
herbie-lint 1.0.7
This project contains known security vulnerabilities. Find detailed information at the bottom.
herbie-lint
(6 total, 4 outdated, 1 insecure, 1 possibly insecure)
Crate | Required | Latest | Status |
---|---|---|---|
clippy | ~0.0 | 0.0.302 | up to date |
itertools | ^0.4.8 | 0.13.0 | out of date |
rusqlite ⚠️ | ^0.6.0 | 0.31.0 | out of date |
rustc-serialize ⚠️ | ^0.3.18 | 0.3.25 | insecure |
toml | ^0.1.27 | 0.8.13 | out of date |
wait-timeout | ^0.1.2 | 0.2.0 | out of date |
(1 total, 1 outdated)
Crate | Required | Latest | Status |
---|---|---|---|
compiletest_rs | ^0.1.0 | 0.10.2 | out of date |
rusqlite
: Various memory safety issuesSeveral memory safety issues have been uncovered in an audit of rusqlite.
See https://github.com/rusqlite/rusqlite/releases/tag/0.23.0 for a complete list.
rustc-serialize
: Stack overflow in rustc_serialize when parsing deeply nested JSONWhen parsing JSON using json::Json::from_str
, there is no limit to the depth of the stack, therefore deeply nested objects can cause a stack overflow, which aborts the process.
Example code that triggers the vulnerability is
fn main() {
let _ = rustc_serialize::json::Json::from_str(&"[0,[".repeat(10000));
}
serde is recommended as a replacement to rustc_serialize.