This project might be open to known security vulnerabilities, which can be prevented by tightening the version range of affected dependencies. Find detailed information at the bottom.

Crate nu-cli

Dependencies

(21 total, 13 outdated, 1 possibly insecure)

CrateRequiredLatestStatus
 atty^0.20.2.14up to date
 chrono ⚠️^0.40.4.38maybe insecure
 crossterm^0.260.28.1out of date
 fancy-regex^0.110.13.0out of date
 fuzzy-matcher^0.30.3.7up to date
 is_executable^1.01.0.4up to date
 log^0.40.4.22up to date
 miette^5.97.2.0out of date
 nu-ansi-term^0.47.00.50.1out of date
 nu-color-config^0.81.00.99.0out of date
 nu-command^0.81.00.99.0out of date
 nu-engine^0.81.00.99.0out of date
 nu-parser^0.81.00.99.0out of date
 nu-path^0.81.00.99.0out of date
 nu-protocol^0.81.00.99.0out of date
 nu-utils^0.81.00.99.0out of date
 once_cell^1.171.20.2up to date
 percent-encoding^22.3.1up to date
 reedline^0.20.00.36.0out of date
 sysinfo^0.290.32.0out of date
 unicode-segmentation^1.101.12.0up to date

Dev dependencies

(2 total, 2 outdated)

CrateRequiredLatestStatus
 nu-test-support^0.81.00.99.0out of date
 rstest^0.17.00.23.0out of date

Security Vulnerabilities

chrono: Potential segfault in `localtime_r` invocations

RUSTSEC-2020-0159

Impact

Unix-like operating systems may segfault due to dereferencing a dangling pointer in specific circumstances. This requires an environment variable to be set in a different thread than the affected functions. This may occur without the user's knowledge, notably in a third-party library.

Workarounds

No workarounds are known.

References