This project contains known security vulnerabilities. Find detailed information at the bottom.

Crate qni-core-rs

Dependencies

(5 total, 2 outdated, 1 insecure, 1 possibly insecure)

CrateRequiredLatestStatus
 atomic-option ⚠️^0.1.20.1.2insecure
 chrono ⚠️^0.4.60.4.38maybe insecure
 failure^0.1.30.1.8up to date
 futures^0.1.250.3.30out of date
 protobuf^2.83.4.0out of date

Security Vulnerabilities

atomic-option: AtomicOption should have Send + Sync bound on its type argument.

RUSTSEC-2020-0113

In the affected versions of this crate, AtomicOption<T> unconditionally implements Sync.

This allows programmers to move non-Sync types across thread boundaries (e.g. Rc<T>, Arc<Cell<T>>), which can lead to data races and undefined behavior. It is also possible to send non-Send types like std::sync::MutexGuard to other threads, which can lead to undefined behavior.

chrono: Potential segfault in `localtime_r` invocations

RUSTSEC-2020-0159

Impact

Unix-like operating systems may segfault due to dereferencing a dangling pointer in specific circumstances. This requires an environment variable to be set in a different thread than the affected functions. This may occur without the user's knowledge, notably in a third-party library.

Workarounds

No workarounds are known.

References