This project contains known security vulnerabilities. Find detailed information at the bottom.

Crate procs

Dependencies

(23 total, 12 outdated, 1 insecure, 1 possibly insecure)

CrateRequiredLatestStatus
 chrono ⚠️^0.40.4.41maybe insecure
 console^0.90.16.0out of date
 directories^2.06.0.0out of date
 dockworker^0.0.150.12.0out of date
 errno^0.20.3.13out of date
 failure^0.10.1.8up to date
 getch^0.20.3.1out of date
 lazy_static^1.21.5.0up to date
 libc^0.20.2.174up to date
 libproc^0.50.14.10out of date
 pager^0.150.16.1out of date
 process_path^0.10.1.4up to date
 procfs^0.7.10.17.0out of date
 quale^1.01.0.0up to date
 runas^0.11.2.0out of date
 serde^1.01.0.219up to date
 serde_derive^1.01.0.219up to date
 structopt^0.30.3.26up to date
 toml^0.50.8.23out of date
 unbytify^0.20.2.0up to date
 unicode-width^0.10.2.1out of date
 users ⚠️^0.90.11.0insecure
 winapi^0.30.3.9up to date

Security Vulnerabilities

chrono: Potential segfault in `localtime_r` invocations

RUSTSEC-2020-0159

Impact

Unix-like operating systems may segfault due to dereferencing a dangling pointer in specific circumstances. This requires an environment variable to be set in a different thread than the affected functions. This may occur without the user's knowledge, notably in a third-party library.

Workarounds

No workarounds are known.

References

users: `root` appended to group listings

RUSTSEC-2025-0040

Affected versions append root to group listings, unless the correct listing has exactly 1024 groups.

This affects both:

  • The supplementary groups of a user
  • The group access list of the current process

If the caller uses this information for access control, this may lead to privilege escalation.

This crate is not currently maintained, so a patched version is not available.

Versions older than 0.8.0 do not contain the affected functions, so downgrading to them is a workaround.

Recommended alternatives

  • uzers (an actively maintained fork of the users crate)
  • sysinfo