This project might be open to known security vulnerabilities, which can be prevented by tightening the version range of affected dependencies. Find detailed information at the bottom.

Crate deno_kv

Dependencies

(25 total, 7 outdated, 1 possibly insecure)

CrateRequiredLatestStatus
 anyhow^1.0.571.0.94up to date
 async-trait^0.1.730.1.83up to date
 base64^0.21.70.22.1out of date
 boxed_error^0.2.20.2.3up to date
 bytes^1.4.01.9.0up to date
 chrono ⚠️^0.40.4.39maybe insecure
 deno_core^0.324.00.326.0out of date
 deno_fetch^0.206.00.207.0out of date
 deno_path_util=0.2.10.2.2out of date
 deno_permissions^0.42.00.43.0out of date
 deno_tls^0.169.00.170.0out of date
 denokv_proto^0.8.40.8.4up to date
 denokv_remote^0.8.40.8.4up to date
 denokv_sqlite^0.8.40.8.4up to date
 faster-hex^0.90.10.0out of date
 http^1.01.2.0up to date
 http-body-util^0.1.20.1.2up to date
 log^0.4.200.4.22up to date
 num-bigint^0.40.4.6up to date
 prost^0.130.13.4up to date
 rand=0.8.50.8.5up to date
 rusqlite^0.32.00.32.1up to date
 serde^1.0.1491.0.216up to date
 thiserror^2.0.32.0.7up to date
 url^2.52.5.4up to date

Security Vulnerabilities

chrono: Potential segfault in `localtime_r` invocations

RUSTSEC-2020-0159

Impact

Unix-like operating systems may segfault due to dereferencing a dangling pointer in specific circumstances. This requires an environment variable to be set in a different thread than the affected functions. This may occur without the user's knowledge, notably in a third-party library.

Workarounds

No workarounds are known.

References