Affected versions of this crate did not properly check for recursion while deserializing aliases.
This allows an attacker to make a YAML file with an alias referring to itself causing an abort.
The flaw was corrected by checking the recursion depth.
This project might be open to known security vulnerabilities, which can be prevented by tightening the version range of affected dependencies. Find detailed information at the bottom.
clippy-wrapperNo external dependencies! 🙌
micromux(10 total, 2 possibly insecure)
| Crate | Required | Latest | Status |
|---|---|---|---|
| shlex ⚠️ | ^1 | 1.3.0 | maybe insecure |
| nix ⚠️ | ^0 | 0.31.2 | maybe insecure |
| alacritty_terminal | ^0.25 | 0.25.1 | up to date |
| portable-pty | ^0.9 | 0.9.0 | up to date |
| petgraph | ^0 | 0.8.3 | up to date |
| directories | ^6 | 6.0.0 | up to date |
| humantime | ^2 | 2.3.0 | up to date |
| shellexpand | ^3 | 3.1.2 | up to date |
| unindent | ^0 | 0.2.4 | up to date |
| yaml-spanned | ^0 | 0.0.3 | up to date |
(3 total, 1 possibly insecure)
| Crate | Required | Latest | Status |
|---|---|---|---|
| jsonschema | ^0 | 0.45.0 | up to date |
| serde_json | ^1 | 1.0.149 | up to date |
| serde_yaml ⚠️ | ^0 | 0.9.34+deprecated | maybe insecure |
micromux-tui(5 total, all up-to-date)
| Crate | Required | Latest | Status |
|---|---|---|---|
| ratatui | ^0 | 0.30.0 | up to date |
| ansi-to-tui | ^8 | 8.0.1 | up to date |
| strip-ansi-escapes | ^0 | 0.2.1 | up to date |
| crossterm | ^0.29 | 0.29.0 | up to date |
| tokio-stream | ^0 | 0.1.18 | up to date |
micromux-cli(4 total, 1 possibly insecure)
| Crate | Required | Latest | Status |
|---|---|---|---|
| tracing-subscriber ⚠️ | ^0 | 0.3.23 | maybe insecure |
| tracing-appender | ^0 | 0.2.4 | up to date |
| termcolor | ^1 | 1.4.1 | up to date |
| clap | ^4 | 4.6.0 | up to date |
serde_yaml: Uncontrolled recursion leads to abort in deserializationAffected versions of this crate did not properly check for recursion while deserializing aliases.
This allows an attacker to make a YAML file with an alias referring to itself causing an abort.
The flaw was corrected by checking the recursion depth.
nix: Out-of-bounds write in nix::unistd::getgrouplistOn certain platforms, if a user has more than 16 groups, the
nix::unistd::getgrouplist function will call the libc getgrouplist
function with a length parameter greater than the size of the buffer it
provides, resulting in an out-of-bounds write and memory corruption.
The libc getgrouplist function takes an in/out parameter ngroups
specifying the size of the group buffer. When the buffer is too small to
hold all of the requested user's group memberships, some libc
implementations, including glibc and Solaris libc, will modify ngroups
to indicate the actual number of groups for the user, in addition to
returning an error. The version of nix::unistd::getgrouplist in nix
0.16.0 and up will resize the buffer to twice its size, but will not
read or modify the ngroups variable. Thus, if the user has more than
twice as many groups as the initial buffer size of 8, the next call to
getgrouplist will then write past the end of the buffer.
The issue would require editing /etc/groups to exploit, which is usually only editable by the root user.
shlex: Multiple issues involving quote APIAffected versions of this crate allowed the bytes { and \xa0 to appear
unquoted and unescaped in command arguments.
If the output of quote or join is passed to a shell, then what should be a
single command argument could be interpreted as multiple arguments.
This does not directly allow arbitrary command execution (you can't inject a command substitution or similar). But depending on the command you're running, being able to inject multiple arguments where only one is expected could lead to undesired consequences, potentially including arbitrary command execution.
The flaw was corrected in version 1.2.1 by escaping additional characters. Updating to 1.3.0 is recommended, but 1.2.1 offers a more minimal fix if desired.
Workaround: Check for the bytes { and \xa0 in quote/join input or
output.
(Note: { is problematic because it is used for glob expansion. \xa0 is
problematic because it's treated as a word separator in specific
environments.)
Version 1.3.0 deprecates the quote and join APIs in favor of try_quote
and try_join, which behave the same except that they have Result return
type, returning Err if the input contains nul bytes.
Strings containing nul bytes generally cannot be used in Unix command arguments or environment variables, and most shells cannot handle nul bytes even internally. If you try to pass one anyway, then the results might be security-sensitive in uncommon scenarios. More details here.
Due to the low severity, the behavior of the original quote and join APIs
has not changed; they continue to allow nuls.
Workaround: Manually check for nul bytes in quote/join input or output.
The quote family of functions does not and cannot escape control characters.
With non-interactive shells this is perfectly safe, as control characters have
no special effect. But if you writing directly to the standard input of an
interactive shell (or through a pty), then control characters can cause
misbehavior including arbitrary command injection.
This is essentially unfixable, and has not been patched. But as of version 1.3.0, documentation has been added.
Future versions of shlex may add API variants that avoid the issue at the
cost of reduced portability.
tracing-subscriber: Logging user input may result in poisoning logs with ANSI escape sequencesPrevious versions of tracing-subscriber were vulnerable to ANSI escape sequence injection attacks. Untrusted user input containing ANSI escape sequences could be injected into terminal output when logged, potentially allowing attackers to:
In isolation, impact is minimal, however security issues have been found in terminal emulators that enabled an attacker to use ANSI escape sequences via logs to exploit vulnerabilities in the terminal emulator.
This was patched in PR #3368 to escape ANSI control characters from user input.