This project contains known security vulnerabilities. Find detailed information at the bottom.

Crate qni-core-rs

Dependencies

(3 total, 1 outdated, 1 insecure, 2 possibly insecure)

CrateRequiredLatestStatus
 atomic-option ⚠️^0.1.20.1.2insecure
 chrono ⚠️^0.4.60.4.38maybe insecure
 protobuf ⚠️^2.2.03.4.0out of date

Security Vulnerabilities

protobuf: Out of Memory in stream::read_raw_bytes_into()

RUSTSEC-2019-0003

Affected versions of this crate called Vec::reserve() on user-supplied input.

This allows an attacker to cause an Out of Memory condition while calling the vulnerable method on untrusted data.

atomic-option: AtomicOption should have Send + Sync bound on its type argument.

RUSTSEC-2020-0113

In the affected versions of this crate, AtomicOption<T> unconditionally implements Sync.

This allows programmers to move non-Sync types across thread boundaries (e.g. Rc<T>, Arc<Cell<T>>), which can lead to data races and undefined behavior. It is also possible to send non-Send types like std::sync::MutexGuard to other threads, which can lead to undefined behavior.

chrono: Potential segfault in `localtime_r` invocations

RUSTSEC-2020-0159

Impact

Unix-like operating systems may segfault due to dereferencing a dangling pointer in specific circumstances. This requires an environment variable to be set in a different thread than the affected functions. This may occur without the user's knowledge, notably in a third-party library.

Workarounds

No workarounds are known.

References