This project might be open to known security vulnerabilities, which can be prevented by tightening the version range of affected dependencies. Find detailed information at the bottom.

Crate i-slint-core

Dependencies

(42 total, 5 outdated, 1 possibly insecure)

CrateRequiredLatestStatus
 auto_enums^0.8.00.8.6up to date
 bitflags^2.4.22.6.0up to date
 bytemuck^1.13.11.19.0up to date
 cfg-if^11.0.0up to date
 chrono ⚠️^0.40.4.38maybe insecure
 clru^0.6.00.6.2up to date
 const-field-offset^0.1.50.1.5up to date
 derive_more^0.99.171.0.0out of date
 euclid^0.22.10.22.11up to date
 fontdb^0.18.00.23.0out of date
 fontdue^0.9.00.9.2up to date
 gettext-rs^0.70.7.2up to date
 i-slint-common=1.8.01.8.0up to date
 i-slint-core-macros=1.8.01.8.0up to date
 image^0.240.25.4out of date
 integer-sqrt^0.1.50.1.5up to date
 lyon_algorithms^1.01.0.4up to date
 lyon_extra^1.0.11.0.3up to date
 lyon_geom^1.01.0.6up to date
 lyon_path^1.01.0.6up to date
 num-traits^0.20.2.19up to date
 once_cell^1.51.20.2up to date
 pin-project^11.1.7up to date
 pin-weak^1.11.1.0up to date
 portable-atomic^11.9.0up to date
 raw-window-handle^0.60.6.2up to date
 resvg^0.42.00.44.0out of date
 rgb^0.8.270.8.50up to date
 rustybuzz^0.14.00.20.0out of date
 scoped-tls-hkt^0.10.1.5up to date
 scopeguard^1.1.01.2.0up to date
 serde^1.0.1631.0.214up to date
 slab^0.4.30.4.9up to date
 static_assertions^1.11.1.0up to date
 strum^0.26.10.26.3up to date
 unicode-linebreak^0.1.20.1.5up to date
 unicode-script^0.5.30.5.7up to date
 unicode-segmentation^1.8.01.12.0up to date
 vtable^0.20.2.0up to date
 wasm-bindgen^0.20.2.95up to date
 web-sys^0.30.3.72up to date
 web-time^1.01.1.0up to date

Dev dependencies

(8 total, 3 outdated)

CrateRequiredLatestStatus
 async-compat^0.2.40.2.4up to date
 fontdb^0.18.00.23.0out of date
 rustybuzz^0.14.00.20.0out of date
 serde_json^1.0.961.0.132up to date
 tempfile^3.12.03.13.0up to date
 tiny-skia^0.11.00.11.4up to date
 tokio^1.351.41.0up to date
 ttf-parser^0.210.25.0out of date

Security Vulnerabilities

chrono: Potential segfault in `localtime_r` invocations

RUSTSEC-2020-0159

Impact

Unix-like operating systems may segfault due to dereferencing a dangling pointer in specific circumstances. This requires an environment variable to be set in a different thread than the affected functions. This may occur without the user's knowledge, notably in a third-party library.

Workarounds

No workarounds are known.

References