-
Notifications
You must be signed in to change notification settings - Fork 59
[Build] RUSTSEC-2020-0071: Potential segfault in the time crate #325
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Comments
@c0dearm Firstly, thank you for bringing this to my attention. I should have caught this earlier, this should be in dev-dependencies of cargo manifest indeed. Must have slipped through. Sorry about that. However, rest assured that crate from crates.io won't have it as dependency and thus users of arrayfire crate are safe. I have addressed it here already #326 A git hub action to check for vulnerabilities would be definitely useful in general. I think it should run on a PR only if Cargo file is changed. Otherwise, running it on master branch for push event would suffice. |
Hi! It can be just scheduled to run once a day or so. Even if there's no update in the |
Sure! I will try to find some time between today and tomorrow 🙂 |
thank you |
Description
arrayfire-rust
depends on themnist
package that in turn depends on thetime
crate.The following security advisory was raised tonight regarding the
time
crate: c0dearm/mushin#16I think there are a few things to do here:
mnist
package so that the security vulnerability is not there anymore.mushin
project)mnist
really a required dependency? Would it be possible to have it only as a dev dependency or in a Cargo feature flag?The text was updated successfully, but these errors were encountered: