Closed c0dearm closed 2 years ago
@c0dearm Firstly, thank you for bringing this to my attention.
I should have caught this earlier, this should be in dev-dependencies of cargo manifest indeed. Must have slipped through. Sorry about that. However, rest assured that crate from crates.io won't have it as dependency and thus users of arrayfire crate are safe. I have addressed it here already https://github.com/arrayfire/arrayfire-rust/pull/326
A git hub action to check for vulnerabilities would be definitely useful in general. I think it should run on a PR only if Cargo file is changed. Otherwise, running it on master branch for push event would suffice.
Hi! It can be just scheduled to run once a day or so.
Even if there's no update in the Cargo.lock
a new vulnerability might be discovered in one of the package versions.
@c0dearm would you be interested in submitting a PR for this job ? I have created an issue for this https://github.com/arrayfire/arrayfire-rust/issues/327
Sure! I will try to find some time between today and tomorrow 🙂
Sure! I will try to find some time between today and tomorrow slightly_smiling_face
thank you
Description
arrayfire-rust
depends on themnist
package that in turn depends on thetime
crate.The following security advisory was raised tonight regarding the
time
crate: https://github.com/c0dearm/mushin/issues/16I think there are a few things to do here:
mnist
package so that the security vulnerability is not there anymore.mushin
project)mnist
really a required dependency? Would it be possible to have it only as a dev dependency or in a Cargo feature flag?