This project contains known security vulnerabilities. Find detailed information at the bottom.

Crate hunter

Dependencies

(19 total, 10 outdated, 1 insecure, 1 possibly insecure)

CrateRequiredLatestStatus
 alphanumeric-sort^1.0.61.5.3up to date
 chrono ⚠️^0.40.4.41maybe insecure
 dirs-2^1.1.03.0.1out of date
 failure^0.1.50.1.8up to date
 failure_derive^0.1.10.1.8up to date
 lazy_static^0.2.111.5.0out of date
 libc^0.2.510.2.174up to date
 lscolors^0.5.00.20.0out of date
 notify^4.0.98.1.0out of date
 osstrtools^0.1.00.2.2out of date
 parse-ansi^0.1.60.1.6up to date
 rayon^1.0.31.10.0up to date
 signal-notify^0.1.30.1.3up to date
 systemstat^0.1.40.2.4out of date
 termion^1.5.14.0.5out of date
 tree_magic^0.2.10.2.3up to date
 unicode-width^0.1.50.2.1out of date
 users ⚠️^0.80.11.0insecure
 x11-clipboard^0.3.10.9.3out of date

Security Vulnerabilities

chrono: Potential segfault in `localtime_r` invocations

RUSTSEC-2020-0159

Impact

Unix-like operating systems may segfault due to dereferencing a dangling pointer in specific circumstances. This requires an environment variable to be set in a different thread than the affected functions. This may occur without the user's knowledge, notably in a third-party library.

Workarounds

No workarounds are known.

References

users: `root` appended to group listings

RUSTSEC-2025-0040

Affected versions append root to group listings, unless the correct listing has exactly 1024 groups.

This affects both:

  • The supplementary groups of a user
  • The group access list of the current process

If the caller uses this information for access control, this may lead to privilege escalation.

This crate is not currently maintained, so a patched version is not available.

Versions older than 0.8.0 do not contain the affected functions, so downgrading to them is a workaround.

Recommended alternatives

  • uzers (an actively maintained fork of the users crate)
  • sysinfo