This project might be open to known security vulnerabilities, which can be prevented by tightening the version range of affected dependencies. Find detailed information at the bottom.

Crate deno_cache

Dependencies

(21 total, 2 outdated, 1 possibly insecure)

CrateRequiredLatestStatus
 async-stream^0.30.3.6up to date
 async-trait^0.1.730.1.89up to date
 base64^0.22.10.22.1up to date
 bytes^1.4.01.11.0up to date
 chrono ⚠️^0.40.4.42maybe insecure
 deno_core^0.372.00.373.0out of date
 deno_error=0.7.10.7.3out of date
 futures^0.3.310.3.31up to date
 http^1.01.4.0up to date
 http-body^1.01.0.1up to date
 http-body-util^0.1.20.1.3up to date
 hyper^1.6.01.8.1up to date
 hyper-util^0.1.170.1.19up to date
 log^0.4.280.4.29up to date
 rusqlite^0.37.00.37.0up to date
 serde^1.0.1491.0.228up to date
 sha2^0.10.80.10.9up to date
 slab^0.40.4.11up to date
 thiserror^2.0.122.0.17up to date
 tokio^1.47.11.48.0up to date
 tokio-util^0.7.160.7.17up to date

Security Vulnerabilities

chrono: Potential segfault in `localtime_r` invocations

RUSTSEC-2020-0159

Impact

Unix-like operating systems may segfault due to dereferencing a dangling pointer in specific circumstances. This requires an environment variable to be set in a different thread than the affected functions. This may occur without the user's knowledge, notably in a third-party library.

Workarounds

No workarounds are known.

References