This project might be open to known security vulnerabilities, which can be prevented by tightening the version range of affected dependencies. Find detailed information at the bottom.

Crate stm32h7xx-hal

Dependencies

(22 total, 8 outdated, 1 possibly insecure)

CrateRequiredLatestStatus
 bare-metal^1.0.01.0.0up to date
 cast^0.3.00.3.0up to date
 chrono ⚠️^0.40.4.42maybe insecure
 cortex-m^0.7.70.7.7up to date
 defmt>=0.2.0, <0.41.0.1out of date
 embedded-display-controller^0.2.00.2.0up to date
 embedded-dma^0.2.00.2.0up to date
 embedded-hal^0.2.61.0.0out of date
 embedded-sdmmc^0.50.9.0out of date
 embedded-storage^0.30.3.1up to date
 fdcan^0.20.2.1up to date
 fugit^0.3.50.3.9up to date
 log^0.4.140.4.29up to date
 nb^1.0.01.1.0up to date
 paste^1.0.11.0.15up to date
 rand_core^0.60.9.3out of date
 sdio-host^0.90.9.0up to date
 smoltcp^0.11.00.12.0out of date
 stm32-fmc^0.30.4.0out of date
 stm32h7^0.15.10.16.0out of date
 synopsys-usb-otg^0.40.5.0out of date
 void^1.0.21.0.2up to date

Dev dependencies

(19 total, 5 outdated)

CrateRequiredLatestStatus
 cfg-if^1.0.01.0.4up to date
 cortex-m-log^0.8.00.8.0up to date
 cortex-m-rt>=0.6.15, <0.80.7.5up to date
 cortex-m-rtic^1.11.1.4up to date
 cortex-m-semihosting^0.5.00.5.0up to date
 eg-seven-segment^0.2.00.2.0up to date
 embedded-graphics^0.80.8.1up to date
 lazy_static^1.4.01.5.0up to date
 log^0.4.110.4.29up to date
 numtoa^0.2.30.3.1out of date
 otm8009a^0.10.1.0up to date
 panic-halt^0.2.01.0.0out of date
 panic-itm~0.4.10.4.2up to date
 panic-rtt-target^0.1.00.2.0out of date
 panic-semihosting^0.60.6.0up to date
 rtt-target^0.4.00.6.2out of date
 tinybmp^0.50.6.0out of date
 usb-device^0.30.3.2up to date
 usbd-serial^0.2.00.2.2up to date

Security Vulnerabilities

chrono: Potential segfault in `localtime_r` invocations

RUSTSEC-2020-0159

Impact

Unix-like operating systems may segfault due to dereferencing a dangling pointer in specific circumstances. This requires an environment variable to be set in a different thread than the affected functions. This may occur without the user's knowledge, notably in a third-party library.

Workarounds

No workarounds are known.

References