This project might be open to known security vulnerabilities, which can be prevented by tightening the version range of affected dependencies. Find detailed information at the bottom.

Crate procs

Dependencies

(22 total, 12 outdated, 1 possibly insecure)

CrateRequiredLatestStatus
 anyhow^1.01.0.82up to date
 byte-unit^35.1.4out of date
 chrono ⚠️^0.40.4.38maybe insecure
 console^0.9.20.15.8out of date
 directories^2.05.0.1out of date
 dockworker^0.0.150.5.0out of date
 errno^0.20.3.8out of date
 getch^0.20.3.1out of date
 lazy_static^1.21.4.0up to date
 libc^0.20.2.153up to date
 libproc^0.50.14.6out of date
 pager^0.150.16.1out of date
 process_path^0.10.1.4up to date
 procfs^0.7.10.16.0out of date
 serde^1.01.0.198up to date
 serde_derive^1.01.0.198up to date
 structopt^0.30.3.26up to date
 toml^0.50.8.12out of date
 unicode-width^0.10.1.11up to date
 users^0.90.11.0out of date
 which^36.0.1out of date
 winapi^0.30.3.9up to date

Security Vulnerabilities

chrono: Potential segfault in `localtime_r` invocations

RUSTSEC-2020-0159

Impact

Unix-like operating systems may segfault due to dereferencing a dangling pointer in specific circumstances. This requires an environment variable to be set in a different thread than the affected functions. This may occur without the user's knowledge, notably in a third-party library.

Workarounds

No workarounds are known.

References