You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
error[vulnerability]: `libsqlite3-sys` via C SQLite CVE-2022-35737
┌─ /n/nvme1/nstinus/src/givre/Cargo.lock:130:1
│
130 │ libsqlite3-sys 0.24.2 registry+https://github.com/rust-lang/crates.io-index
│ --------------------------------------------------------------------------- security vulnerability detected
│
= ID: RUSTSEC-2022-0090
= Advisory: https://rustsec.org/advisories/RUSTSEC-2022-0090
= It was sometimes possible for SQLite versions >= 1.0.12, < 3.39.2 to allow an array-bounds overflow when large string were input into SQLite's `printf` function.
As `libsqlite3-sys` bundles SQLite, it is susceptible to the vulnerability. `libsqlite3-sys` was updated to bundle the patched version of SQLite [here](https://github.com/rusqlite/rusqlite/releases/tag/sys0.25.1).
= Announcement: https://nvd.nist.gov/vuln/detail/CVE-2022-35737
= Solution: Upgrade to >=0.25.1
= libsqlite3-sys v0.24.2
└── sqlx-core v0.6.2
├── sqlx v0.6.2
│ └── klb-givre-rime v0.11.0
└── sqlx-macros v0.6.2
└── sqlx v0.6.2 (*)
Minimal Reproduction
Configure a project with sqlx and invoke cargo deny.
Bug Description
A CVE was posted on libsqlite3-sys <0.25:
Minimal Reproduction
Configure a project with sqlx and invoke
cargo deny
.Info
rustc --version
: rustc 1.67.1 (d5a82bbd2 2023-02-07)The text was updated successfully, but these errors were encountered: