This project might be open to known security vulnerabilities, which can be prevented by tightening the version range of affected dependencies. Find detailed information at the bottom.

Crate unc-chain-configs

Dependencies

(16 total, 8 outdated, 1 possibly insecure)

CrateRequiredLatestStatus
 anyhow^1.0.621.0.94up to date
 bytesize^1.11.3.0up to date
 chrono ⚠️^0.4.190.4.39maybe insecure
 derive_more^0.99.91.0.0out of date
 num-rational^0.3.10.4.2out of date
 once_cell^1.13.11.20.2up to date
 serde^1.0.1361.0.216up to date
 serde_json^1.0.681.0.134up to date
 sha2^0.100.10.8up to date
 smart-default^0.60.7.1out of date
 tracing^0.1.360.1.41up to date
 unc-config-utils^0.5.10.12.2out of date
 unc-crypto^0.5.10.12.2out of date
 unc-o11y^0.5.10.12.2out of date
 unc-parameters^0.5.10.12.2out of date
 unc-primitives^0.5.10.12.2out of date

Security Vulnerabilities

chrono: Potential segfault in `localtime_r` invocations

RUSTSEC-2020-0159

Impact

Unix-like operating systems may segfault due to dereferencing a dangling pointer in specific circumstances. This requires an environment variable to be set in a different thread than the affected functions. This may occur without the user's knowledge, notably in a third-party library.

Workarounds

No workarounds are known.

References