-
Notifications
You must be signed in to change notification settings - Fork 365
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add chrono
advisory for chrono#499 (localtime_r)
#1082
Conversation
This is an advisory similar to `RUSTSEC-2020-0071` impacting usages of `localtime_r` within `chrono` itself, since the API is used in a cross-thread manner in an unsound way.
11b1440
to
d7dad3f
Compare
Note that there are reports of this impacting real-world code. |
Is it possible to whitelist a crate using |
It's been suggested before but not something we support: #288. More generally we've wanted to support false positive elimination via call graph analysis: rustsec/rustsec#21 |
Thanks for pointers! Call graph analysis sounds useful but not perfect because in some situations there may be multiple factors, so I think #288 is still valuable and probably easier to implement. |
Due to a CVE in chrono[0] we switch to time 0.3.3. Chrono actually depends on an older, similarly vulnerable version of `time` but newer versions of `time` seem to offer everything we need to validate dates and times anyway. [0] rustsec/advisory-db#1082 Signed-off-by: Alex Good <[email protected]>
Due to a CVE in chrono[0] we switch to time 0.3.3. Chrono actually depends on an older, similarly vulnerable version of `time` but newer versions of `time` seem to offer everything we need to validate dates and times anyway. [0] rustsec/advisory-db#1082 Signed-off-by: Alex Good <[email protected]>
Due to a CVE in chrono[0] we switch to time 0.3.3. Chrono actually depends on an older, similarly vulnerable version of `time` but newer versions of `time` seem to offer everything we need to validate dates and times anyway. [0] rustsec/advisory-db#1082 Signed-off-by: Alex Good <[email protected]>
Due to a CVE in chrono[0] we switch to time 0.3.3. Chrono actually depends on an older, similarly vulnerable version of `time` but newer versions of `time` seem to offer everything we need to validate dates and times anyway. [0] rustsec/advisory-db#1082 Signed-off-by: Alex Good <[email protected]>
Due to a CVE in chrono[0] we switch to time 0.3.3. Chrono actually depends on an older, similarly vulnerable version of `time` but newer versions of `time` seem to offer everything we need to validate dates and times anyway. [0] rustsec/advisory-db#1082 Signed-off-by: Alex Good <[email protected]> (cherry picked from commit 625c66e)
This is an advisory similar to
RUSTSEC-2020-0071
impacting usages oflocaltime_r
withinchrono
itself, since the API is used in a cross-thread manner in an unsound way.