This project might be open to known security vulnerabilities, which can be prevented by tightening the version range of affected dependencies. Find detailed information at the bottom.

Crate asuran-core

Dependencies

(25 total, 17 outdated, 1 possibly insecure)

CrateRequiredLatestStatus
 aes^0.3.20.8.4out of date
 aes-ctr^0.3.00.99.99out of date
 blake2b_simd^0.5.101.0.2out of date
 blake3^0.2.21.5.1out of date
 block-modes^0.3.30.9.1out of date
 byteorder^1.3.41.5.0up to date
 cfg-if^0.1.101.0.0out of date
 chacha20^0.3.40.9.1out of date
 chrono ⚠️^0.4.110.4.38maybe insecure
 hmac^0.7.10.12.1out of date
 lz4^1.23.11.24.0up to date
 rand^0.7.30.8.5out of date
 rmp-serde^0.14.31.2.0out of date
 rust-argon2^0.8.12.1.0out of date
 semver^0.9.01.0.22out of date
 serde^1.0.1041.0.198up to date
 serde_bytes^0.11.30.11.14up to date
 sha2^0.8.10.10.8out of date
 sha3^0.8.20.10.8out of date
 stream-cipher^0.3.20.99.99out of date
 thiserror^1.0.111.0.59up to date
 uuid^0.8.11.8.0out of date
 xz2^0.1.60.1.7up to date
 zeroize^1.1.01.7.0up to date
 zstd^0.5.10.13.1out of date

Security Vulnerabilities

chrono: Potential segfault in `localtime_r` invocations

RUSTSEC-2020-0159

Impact

Unix-like operating systems may segfault due to dereferencing a dangling pointer in specific circumstances. This requires an environment variable to be set in a different thread than the affected functions. This may occur without the user's knowledge, notably in a third-party library.

Workarounds

No workarounds are known.

References