This project might be open to known security vulnerabilities, which can be prevented by tightening the version range of affected dependencies. Find detailed information at the bottom.

Crate svc-authn

Dependencies

(13 total, 6 outdated, 2 possibly insecure)

CrateRequiredLatestStatus
 atty^0.20.2.14up to date
 chrono ⚠️^0.40.4.38maybe insecure
 config^0.130.14.0out of date
 diesel ⚠️^12.1.6out of date
 dirs^55.0.1up to date
 http^0.21.1.0out of date
 jsonwebtoken^79.3.0out of date
 serde^11.0.200up to date
 serde_derive^11.0.200up to date
 serde_json^11.0.116up to date
 sqlx^0.60.7.4out of date
 structopt^0.30.3.26up to date
 toml^0.70.8.12out of date

Security Vulnerabilities

chrono: Potential segfault in `localtime_r` invocations

RUSTSEC-2020-0159

Impact

Unix-like operating systems may segfault due to dereferencing a dangling pointer in specific circumstances. This requires an environment variable to be set in a different thread than the affected functions. This may occur without the user's knowledge, notably in a third-party library.

Workarounds

No workarounds are known.

References

diesel: Fix a use-after-free bug in diesels Sqlite backend

RUSTSEC-2021-0037

We've misused sqlite3_column_name. The SQLite documentation states that the following:

The returned string pointer is valid until either the prepared statement is destroyed by sqlite3_finalize() or until the statement is automatically reprepared by the first call to sqlite3_step() for a particular run or until the next call to sqlite3_column_name() or sqlite3_column_name16() on the same column.

As part of our query_by_name infrastructure we've first received all field names for the prepared statement and stored them as string slices for later use. After that we called sqlite3_step() for the first time, which invalids the pointer and therefore the stored string slice.