This project might be open to known security vulnerabilities, which can be prevented by tightening the version range of affected dependencies. Find detailed information at the bottom.

Crate neovide

Dependencies

(43 total, 2 outdated, 1 possibly insecure)

CrateRequiredLatestStatus
 anyhow^1.0.751.0.82up to date
 async-trait^0.1.530.1.80up to date
 backtrace^0.3.670.3.71up to date
 clap^4.4.184.5.4up to date
 copypasta^0.10.10.10.1up to date
 csscolorparser^0.6.20.6.2up to date
 derive-new^0.6.00.6.0up to date
 dirs^5.0.05.0.1up to date
 euclid^0.22.90.22.9up to date
 flexi_logger^0.28.00.28.0up to date
 futures^0.3.210.3.30up to date
 gl^0.14.00.14.0up to date
 glutin^0.31.10.31.3up to date
 glutin-winit^0.4.20.4.2up to date
 image^0.25.00.25.1up to date
 indoc^2.0.52.0.5up to date
 itertools^0.12.10.12.1up to date
 lazy_static^1.4.01.4.0up to date
 log^0.4.160.4.21up to date
 lru^0.12.20.12.3up to date
 num^0.4.10.4.2up to date
 nvim-rs^0.7.00.7.0up to date
 parking_lot^0.12.00.12.2up to date
 rand^0.8.50.8.5up to date
 raw-window-handle^0.5.00.6.1out of date
 rmpv^1.0.01.3.0up to date
 serde^1.0.1361.0.200up to date
 serde_json^1.0.791.0.116up to date
 shlex ⚠️^1.1.01.3.0maybe insecure
 spin_sleep^1.1.11.2.0up to date
 strum^0.26.20.26.2up to date
 swash^0.1.80.1.15up to date
 time^0.3.340.3.36up to date
 tokio^1.25.01.37.0up to date
 tokio-util^0.7.40.7.10up to date
 toml^0.8.120.8.12up to date
 tracy-client-sys^0.22.00.22.2up to date
 unicode-segmentation^1.9.01.11.0up to date
 which^6.0.16.0.1up to date
 winit=0.29.150.30.0out of date
 xdg^2.4.12.5.2up to date
 notify^6.1.16.1.1up to date
 regex^1.10.31.10.4up to date

Dev dependencies

(3 total, all up-to-date)

CrateRequiredLatestStatus
 approx^0.5.10.5.1up to date
 scoped-env^2.1.02.1.0up to date
 serial_test^3.0.03.1.1up to date

Crate neovide-derive

Dependencies

(3 total, 1 outdated)

CrateRequiredLatestStatus
 syn^1.02.0.60out of date
 quote^1.01.0.36up to date
 convert_case^0.6.00.6.0up to date

Security Vulnerabilities

shlex: Multiple issues involving quote API

RUSTSEC-2024-0006

Issue 1: Failure to quote characters

Affected versions of this crate allowed the bytes { and \xa0 to appear unquoted and unescaped in command arguments.

If the output of quote or join is passed to a shell, then what should be a single command argument could be interpreted as multiple arguments.

This does not directly allow arbitrary command execution (you can't inject a command substitution or similar). But depending on the command you're running, being able to inject multiple arguments where only one is expected could lead to undesired consequences, potentially including arbitrary command execution.

The flaw was corrected in version 1.2.1 by escaping additional characters. Updating to 1.3.0 is recommended, but 1.2.1 offers a more minimal fix if desired.

Workaround: Check for the bytes { and \xa0 in quote/join input or output.

(Note: { is problematic because it is used for glob expansion. \xa0 is problematic because it's treated as a word separator in specific environments.)

Issue 2: Dangerous API w.r.t. nul bytes

Version 1.3.0 deprecates the quote and join APIs in favor of try_quote and try_join, which behave the same except that they have Result return type, returning Err if the input contains nul bytes.

Strings containing nul bytes generally cannot be used in Unix command arguments or environment variables, and most shells cannot handle nul bytes even internally. If you try to pass one anyway, then the results might be security-sensitive in uncommon scenarios. More details here.

Due to the low severity, the behavior of the original quote and join APIs has not changed; they continue to allow nuls.

Workaround: Manually check for nul bytes in quote/join input or output.

Issue 3: Lack of documentation for interactive shell risks

The quote family of functions does not and cannot escape control characters. With non-interactive shells this is perfectly safe, as control characters have no special effect. But if you writing directly to the standard input of an interactive shell (or through a pty), then control characters can cause misbehavior including arbitrary command injection.

This is essentially unfixable, and has not been patched. But as of version 1.3.0, documentation has been added.

Future versions of shlex may add API variants that avoid the issue at the cost of reduced portability.