This project might be open to known security vulnerabilities, which can be prevented by tightening the version range of affected dependencies. Find detailed information at the bottom.

Crate prism-mcp-rs

Dependencies

(47 total, 10 outdated, 4 possibly insecure)

CrateRequiredLatestStatus
 serde^1.01.0.219up to date
 serde_json^1.01.0.143up to date
 serde_yaml^0.90.9.34+deprecatedup to date
 tokio^1.341.47.1up to date
 async-trait^0.10.1.89up to date
 tracing^0.10.1.41up to date
 tracing-subscriber^0.30.3.19up to date
 thiserror^2.02.0.16up to date
 anyhow^1.01.0.99up to date
 chrono ⚠️^0.40.4.41maybe insecure
 futures^0.30.3.31up to date
 tokio-util^0.70.7.16up to date
 bytes^1.51.10.1up to date
 pin-project^1.11.1.10up to date
 once_cell^1.191.21.3up to date
 indexmap^2.02.10.0up to date
 dashmap^6.1.06.1.0up to date
 parking_lot^0.120.12.4up to date
 reqwest^0.120.12.23up to date
 hyper^1.61.7.0up to date
 tower^0.50.5.2up to date
 tower-http^0.60.6.6up to date
 axum^0.70.8.4out of date
 tokio-tungstenite^0.200.27.0out of date
 tungstenite ⚠️^0.200.27.0out of date
 libloading^0.80.8.8up to date
 jsonwebtoken^9.19.3.1up to date
 argon2^0.50.5.3up to date
 rustls ⚠️^0.210.23.31out of date
 tokio-rustls^0.240.26.2out of date
 color-eyre^0.60.6.5up to date
 url^2.52.5.4up to date
 rand^0.80.9.2out of date
 brotli^7.08.0.2out of date
 zstd^0.130.13.3up to date
 notify^6.18.2.0out of date
 base64^0.220.22.1up to date
 sha2^0.100.10.9up to date
 futures-util^0.30.3.31up to date
 tokio-stream^0.10.1.17up to date
 h2 ⚠️^0.40.4.12maybe insecure
 flate2^1.01.1.2up to date
 uuid^1.101.18.0up to date
 http^1.31.3.1up to date
 dirs^5.06.0.0out of date
 fastrand^2.32.3.0up to date
 criterion^0.50.7.0out of date

Dev dependencies

(14 total, 3 outdated)

CrateRequiredLatestStatus
 proptest^1.31.7.0up to date
 test-log^0.20.2.18up to date
 env_logger^0.100.11.8out of date
 tokio-test^0.40.4.4up to date
 mockito^1.21.7.0up to date
 wiremock^0.60.6.4up to date
 serial_test^3.03.2.0up to date
 tempfile^3.83.21.0up to date
 regex^1.101.11.1up to date
 rstest^0.180.26.1out of date
 fake^2.84.4.0out of date
 quickcheck^1.01.0.3up to date
 quickcheck_macros^1.01.1.0up to date
 insta^1.341.43.1up to date

Security Vulnerabilities

chrono: Potential segfault in `localtime_r` invocations

RUSTSEC-2020-0159

Impact

Unix-like operating systems may segfault due to dereferencing a dangling pointer in specific circumstances. This requires an environment variable to be set in a different thread than the affected functions. This may occur without the user's knowledge, notably in a third-party library.

Workarounds

No workarounds are known.

References

tungstenite: Tungstenite allows remote attackers to cause a denial of service

RUSTSEC-2023-0065

The Tungstenite crate through 0.20.0 for Rust allows remote attackers to cause a denial of service (minutes of CPU consumption) via an excessive length of an HTTP header in a client handshake. The length affects both how many times a parse is attempted (e.g., thousands of times) and the average amount of data for each parse attempt (e.g., millions of bytes).

h2: Degradation of service in h2 servers with CONTINUATION Flood

RUSTSEC-2024-0332

An attacker can send a flood of CONTINUATION frames, causing h2 to process them indefinitely. This results in an increase in CPU usage.

Tokio task budget helps prevent this from a complete denial-of-service, as the server can still respond to legitimate requests, albeit with increased latency.

More details at "https://seanmonstar.com/blog/hyper-http2-continuation-flood/.

Patches available for 0.4.x and 0.3.x versions.

rustls: `rustls::ConnectionCommon::complete_io` could fall into an infinite loop based on network input

RUSTSEC-2024-0336

If a close_notify alert is received during a handshake, complete_io does not terminate.

Callers which do not call complete_io are not affected.

rustls-tokio and rustls-ffi do not call complete_io and are not affected.

rustls::Stream and rustls::StreamOwned types use complete_io and are affected.