This project might be open to known security vulnerabilities, which can be prevented by tightening the version range of affected dependencies. Find detailed information at the bottom.

Crate deno_config

Dependencies

(19 total, 3 outdated, 1 possibly insecure)

CrateRequiredLatestStatus
 boxed_error^0.2.30.2.3up to date
 capacity_builder^0.5.00.5.0up to date
 chrono ⚠️^0.40.4.42maybe insecure
 deno_error=0.7.10.7.3out of date
 deno_maybe_sync^0.9.00.9.0up to date
 deno_package_json^0.24.00.24.0up to date
 deno_path_util=0.6.40.6.4up to date
 deno_semver=0.9.10.9.1up to date
 glob^0.3.10.3.3up to date
 ignore^0.40.4.25up to date
 import_map^0.24.00.24.0up to date
 indexmap^22.12.1up to date
 jsonc-parser^0.27.10.28.0out of date
 log^0.4.280.4.29up to date
 serde^1.0.1491.0.228up to date
 serde_json^1.0.851.0.145up to date
 sys_traits=0.1.170.1.21out of date
 thiserror^2.0.122.0.17up to date
 url^2.52.5.7up to date

Dev dependencies

(3 total, 1 outdated)

CrateRequiredLatestStatus
 pretty_assertions=1.4.11.4.1up to date
 sys_traits=0.1.170.1.21out of date
 tempfile^3.4.03.23.0up to date

Security Vulnerabilities

chrono: Potential segfault in `localtime_r` invocations

RUSTSEC-2020-0159

Impact

Unix-like operating systems may segfault due to dereferencing a dangling pointer in specific circumstances. This requires an environment variable to be set in a different thread than the affected functions. This may occur without the user's knowledge, notably in a third-party library.

Workarounds

No workarounds are known.

References