This project might be open to known security vulnerabilities, which can be prevented by tightening the version range of affected dependencies. Find detailed information at the bottom.

Crate deno

Dependencies

(92 total, 27 outdated, 1 possibly insecure)

CrateRequiredLatestStatus
 async-trait^0.1.730.1.80up to date
 base32=0.4.00.4.0up to date
 base64^0.21.40.22.0out of date
 bincode=1.3.31.3.3up to date
 bytes^1.4.01.6.0up to date
 cache_control=0.2.00.2.0up to date
 chrono ⚠️^0.40.4.38maybe insecure
 clap=4.4.174.5.4out of date
 clap_complete=4.4.74.5.2out of date
 clap_complete_fig=4.4.24.5.0out of date
 color-print^0.3.50.3.6up to date
 console_static_text=0.8.10.8.2out of date
 dashmap^5.5.35.5.3up to date
 data-encoding^2.3.32.5.0up to date
 deno_ast=0.38.00.38.0up to date
 deno_cache_dir=0.7.10.9.0out of date
 deno_config=0.16.10.16.1up to date
 deno_core^0.278.00.278.0up to date
 deno_doc=0.128.10.128.1up to date
 deno_emit=0.40.10.40.1up to date
 deno_graph=0.74.00.74.0up to date
 deno_lint=0.58.40.58.4up to date
 deno_lockfile^0.19.00.19.0up to date
 deno_npm=0.18.00.20.0out of date
 deno_runtime^0.156.00.155.0out of date
 deno_semver=0.5.40.5.4up to date
 deno_task_shell=0.16.00.16.0up to date
 deno_terminal^0.1.10.1.1up to date
 dissimilar=1.0.41.0.8out of date
 dotenvy^0.15.70.15.7up to date
 dprint-plugin-json=0.19.20.19.2up to date
 dprint-plugin-jupyter=0.1.30.1.3up to date
 dprint-plugin-markdown=0.16.40.16.4up to date
 dprint-plugin-typescript=0.90.40.90.4up to date
 env_logger=0.10.00.11.3out of date
 eszip=0.68.20.68.4out of date
 fancy-regex=0.10.00.13.0out of date
 faster-hex^0.90.9.0up to date
 flate2^1.0.261.0.29up to date
 fs3^0.5.00.5.0up to date
 fwdansi=1.1.01.1.0up to date
 glob^0.3.10.3.1up to date
 ignore^0.40.4.22up to date
 import_map=0.19.00.19.1out of date
 indexmap^22.2.6up to date
 jsonc-parser=0.23.00.23.0up to date
 junction=0.2.01.0.0out of date
 lazy-regex^33.1.0up to date
 libc^0.2.1260.2.153up to date
 libz-sys^1.11.1.16up to date
 log^0.4.200.4.21up to date
 lsp-types=0.94.10.95.1out of date
 memmem^0.1.10.1.1up to date
 monch=0.5.00.5.0up to date
 napi_sym^0.78.00.78.0up to date
 nix=0.26.20.28.0out of date
 notify=5.0.06.1.1out of date
 once_cell^1.17.11.19.0up to date
 open^5.0.15.1.2up to date
 os_pipe=1.1.51.1.5up to date
 p256^0.13.20.13.2up to date
 percent-encoding^2.3.02.3.1up to date
 phf^0.110.11.2up to date
 pin-project^1.0.111.1.5up to date
 quick-junit^0.3.50.4.0out of date
 rand=0.8.50.8.5up to date
 regex^1.7.01.10.4up to date
 reqwest=0.11.200.12.4out of date
 ring^0.17.00.17.8up to date
 rustyline=13.0.014.0.0out of date
 rustyline-derive=0.7.00.10.0out of date
 serde^1.0.1491.0.199up to date
 serde_repr=0.1.160.1.19out of date
 sha2^0.10.80.10.8up to date
 shell-escape=0.1.50.1.5up to date
 spki^0.70.7.3up to date
 tar=0.4.400.4.40up to date
 tempfile^3.4.03.10.1up to date
 text-size=1.1.01.1.1out of date
 text_lines=0.6.00.6.0up to date
 thiserror^1.0.401.0.59up to date
 tokio^1.36.01.37.0up to date
 tokio-util^0.7.40.7.10up to date
 tower-lsp=0.20.00.20.0up to date
 twox-hash=1.6.31.6.3up to date
 typed-arena=2.0.12.0.2out of date
 unicode-width^0.10.1.12up to date
 uuid^1.3.01.8.0up to date
 walkdir=2.3.22.5.0out of date
 winapi=0.3.90.3.9up to date
 zeromq=0.3.40.3.5out of date
 zstd=0.12.40.13.1out of date

Dev dependencies

(2 total, all up-to-date)

CrateRequiredLatestStatus
 deno_bench_util^0.142.00.142.0up to date
 pretty_assertions=1.4.01.4.0up to date

Security Vulnerabilities

chrono: Potential segfault in `localtime_r` invocations

RUSTSEC-2020-0159

Impact

Unix-like operating systems may segfault due to dereferencing a dangling pointer in specific circumstances. This requires an environment variable to be set in a different thread than the affected functions. This may occur without the user's knowledge, notably in a third-party library.

Workarounds

No workarounds are known.

References