This project might be open to known security vulnerabilities, which can be prevented by tightening the version range of affected dependencies. Find detailed information at the bottom.

Crate embassy-stm32

Dependencies

(40 total, 15 outdated, 1 possibly insecure)

CrateRequiredLatestStatus
 aligned^0.4.10.4.2up to date
 bit_field^0.10.20.10.3up to date
 bitflags^2.4.22.9.4up to date
 block-device-driver^0.20.2.0up to date
 cfg-if^1.0.01.0.3up to date
 chrono ⚠️^0.40.4.42maybe insecure
 cortex-m^0.7.60.7.7up to date
 cortex-m-rt>=0.6.15, <0.80.7.5up to date
 critical-section^1.11.2.0up to date
 defmt^0.31.0.1out of date
 document-features^0.2.70.2.11up to date
 embassy-embedded-hal^0.3.00.5.0out of date
 embassy-executor^0.7.00.9.1out of date
 embassy-futures^0.1.00.1.2up to date
 embassy-hal-internal^0.2.00.3.0out of date
 embassy-net-driver^0.2.00.2.0up to date
 embassy-sync^0.6.10.7.2out of date
 embassy-time^0.4.00.5.0out of date
 embassy-time-driver^0.20.2.1up to date
 embassy-time-queue-utils^0.10.3.0out of date
 embassy-usb-driver^0.1.00.2.0out of date
 embassy-usb-synopsys-otg^0.2.00.3.1out of date
 embedded-can^0.40.4.1up to date
 embedded-hal^1.01.0.0up to date
 embedded-hal-async^1.01.0.0up to date
 embedded-hal-nb^1.01.0.0up to date
 embedded-io^0.6.00.7.1out of date
 embedded-io-async^0.6.10.7.0out of date
 embedded-storage^0.3.10.3.1up to date
 embedded-storage-async^0.4.10.4.1up to date
 futures-util^0.3.300.3.31up to date
 log^0.4.140.4.28up to date
 nb^1.0.01.1.0up to date
 rand_core^0.6.30.9.3out of date
 sdio-host^0.5.00.9.0out of date
 static_assertions^1.11.1.0up to date
 stm32-fmc^0.3.00.4.0out of date
 stm32-metapac^1618.0.0out of date
 vcell^0.1.30.1.3up to date
 volatile-register^0.2.10.2.2up to date

Dev dependencies

(3 total, 1 outdated)

CrateRequiredLatestStatus
 critical-section^1.11.2.0up to date
 proptest^1.5.01.8.0up to date
 proptest-state-machine^0.3.00.5.0out of date

Security Vulnerabilities

chrono: Potential segfault in `localtime_r` invocations

RUSTSEC-2020-0159

Impact

Unix-like operating systems may segfault due to dereferencing a dangling pointer in specific circumstances. This requires an environment variable to be set in a different thread than the affected functions. This may occur without the user's knowledge, notably in a third-party library.

Workarounds

No workarounds are known.

References