Several memory safety issues have been uncovered in an audit of rusqlite.
See https://github.com/rusqlite/rusqlite/releases/tag/0.23.0 for a complete list.
sonnerie 0.4.2
This project might be open to known security vulnerabilities, which can be prevented by tightening the version range of affected dependencies. Find detailed information at the bottom.
sonnerie
(15 total, 8 outdated, 3 possibly insecure)
Crate | Required | Latest | Status |
---|---|---|---|
antidote | ^1 | 1.0.0 | up to date |
byteorder | ^1 | 1.5.0 | up to date |
chrono ⚠️ | ^0.4.6 | 0.4.37 | maybe insecure |
clap | ^2 | 4.5.4 | out of date |
daemonize | ^0.3 | 0.5.0 | out of date |
escape_string | ^0.1.0 | 0.1.2 | up to date |
intrusive-collections | ^0.7.5 | 0.9.6 | out of date |
libc | ^0.2.43 | 0.2.153 | up to date |
linestream | ^0.1.0 | 0.1.0 | up to date |
nix | ^0.11 | 0.28.0 | out of date |
range | ^0.3.1 | 1.0.0 | out of date |
rusqlite ⚠️ | ^0.14.0 | 0.31.0 | out of date |
rustyline | ^2 | 14.0.0 | out of date |
shlex ⚠️ | ^0.1.1 | 1.3.0 | out of date |
sonnerie-api | ^0.4.1 | 0.4.1 | up to date |
(1 total, all up-to-date)
Crate | Required | Latest | Status |
---|---|---|---|
tempfile | ^3 | 3.10.1 | up to date |
rusqlite
: Various memory safety issuesSeveral memory safety issues have been uncovered in an audit of rusqlite.
See https://github.com/rusqlite/rusqlite/releases/tag/0.23.0 for a complete list.
chrono
: Potential segfault in `localtime_r` invocationsUnix-like operating systems may segfault due to dereferencing a dangling pointer in specific circumstances. This requires an environment variable to be set in a different thread than the affected functions. This may occur without the user's knowledge, notably in a third-party library.
No workarounds are known.
shlex
: Multiple issues involving quote APIAffected versions of this crate allowed the bytes {
and \xa0
to appear
unquoted and unescaped in command arguments.
If the output of quote
or join
is passed to a shell, then what should be a
single command argument could be interpreted as multiple arguments.
This does not directly allow arbitrary command execution (you can't inject a command substitution or similar). But depending on the command you're running, being able to inject multiple arguments where only one is expected could lead to undesired consequences, potentially including arbitrary command execution.
The flaw was corrected in version 1.2.1 by escaping additional characters. Updating to 1.3.0 is recommended, but 1.2.1 offers a more minimal fix if desired.
Workaround: Check for the bytes {
and \xa0
in quote
/join
input or
output.
(Note: {
is problematic because it is used for glob expansion. \xa0
is
problematic because it's treated as a word separator in specific
environments.)
Version 1.3.0 deprecates the quote
and join
APIs in favor of try_quote
and try_join
, which behave the same except that they have Result
return
type, returning Err
if the input contains nul bytes.
Strings containing nul bytes generally cannot be used in Unix command arguments or environment variables, and most shells cannot handle nul bytes even internally. If you try to pass one anyway, then the results might be security-sensitive in uncommon scenarios. More details here.
Due to the low severity, the behavior of the original quote
and join
APIs
has not changed; they continue to allow nuls.
Workaround: Manually check for nul bytes in quote
/join
input or output.
The quote
family of functions does not and cannot escape control characters.
With non-interactive shells this is perfectly safe, as control characters have
no special effect. But if you writing directly to the standard input of an
interactive shell (or through a pty), then control characters can cause
misbehavior including arbitrary command injection.
This is essentially unfixable, and has not been patched. But as of version 1.3.0, documentation has been added.
Future versions of shlex
may add API variants that avoid the issue at the
cost of reduced portability.