This project might be open to known security vulnerabilities, which can be prevented by tightening the version range of affected dependencies. Find detailed information at the bottom.

Crate pact_matching

Dependencies

(23 total, 17 outdated, 1 possibly insecure)

CrateRequiredLatestStatus
 ansi_term^0.9.00.12.1out of date
 base64^0.12.00.22.1out of date
 chrono ⚠️^0.40.4.38maybe insecure
 chrono-tz^0.40.9.0out of date
 difference^1.0.02.0.0out of date
 hex^0.2.00.4.3out of date
 indextree^1.1.14.6.1out of date
 itertools^0.9.00.12.1out of date
 lazy_static^1.4.01.4.0up to date
 log^0.40.4.21up to date
 maplit^0.1.41.0.2out of date
 nom^4.07.1.3out of date
 onig^4.3.36.4.0out of date
 rand^0.60.8.5out of date
 rand_regex^0.12.00.17.0out of date
 regex-syntax^0.6.40.8.3out of date
 reqwest^0.100.12.4out of date
 semver^0.7.01.0.22out of date
 serde^1.01.0.200up to date
 serde_json^1.01.0.116up to date
 sxd-document^0.2.40.3.2out of date
 tree_magic^0.2.30.2.3up to date
 uuid^0.5.11.8.0out of date

Dev dependencies

(6 total, 2 outdated)

CrateRequiredLatestStatus
 env_logger^0.7.10.11.3out of date
 expectest^0.12.00.12.0up to date
 hamcrest2^0.3.00.3.0up to date
 quickcheck^0.9.21.0.3out of date
 speculate^0.10.1.2up to date
 test-env-log^0.2.20.2.8up to date

Security Vulnerabilities

chrono: Potential segfault in `localtime_r` invocations

RUSTSEC-2020-0159

Impact

Unix-like operating systems may segfault due to dereferencing a dangling pointer in specific circumstances. This requires an environment variable to be set in a different thread than the affected functions. This may occur without the user's knowledge, notably in a third-party library.

Workarounds

No workarounds are known.

References