This project might be open to known security vulnerabilities, which can be prevented by tightening the version range of affected dependencies. Find detailed information at the bottom.

Crate exonum-crypto

Dependencies

(16 total, 7 outdated, 1 possibly insecure)

CrateRequiredLatestStatus
 bit-vec^0.6.10.6.3up to date
 byteorder^1.2.71.5.0up to date
 chrono ⚠️^0.4.60.4.38maybe insecure
 exonum-proto^0.13.0-rc.21.0.0out of date
 exonum_sodiumoxide^0.0.230.0.24out of date
 failure^0.1.50.1.8up to date
 hex^0.40.4.3up to date
 hex-buffer-serde^0.2.00.4.0out of date
 protobuf^2.8.13.4.0out of date
 rand^0.70.8.5out of date
 rust_decimal^1.01.35.0up to date
 serde^1.0.1011.0.198up to date
 serde_derive^1.0.1011.0.198up to date
 serde_json^1.0.191.0.116up to date
 toml^0.5.00.8.12out of date
 uuid^0.81.8.0out of date

Dev dependencies

(1 total, all up-to-date)

CrateRequiredLatestStatus
 tempdir^0.3.70.3.7up to date

Security Vulnerabilities

chrono: Potential segfault in `localtime_r` invocations

RUSTSEC-2020-0159

Impact

Unix-like operating systems may segfault due to dereferencing a dangling pointer in specific circumstances. This requires an environment variable to be set in a different thread than the affected functions. This may occur without the user's knowledge, notably in a third-party library.

Workarounds

No workarounds are known.

References