This project might be open to known security vulnerabilities, which can be prevented by tightening the version range of affected dependencies. Find detailed information at the bottom.

Crate minmon

Dependencies

(20 total, 1 possibly insecure)

CrateRequiredLatestStatus
 toml^0.80.8.12up to date
 reqwest^0.120.12.4up to date
 tokio^1.371.37.0up to date
 libsystemd^0.70.7.0up to date
 systemd-journal-logger^2.12.1.1up to date
 serde^1.01.0.200up to date
 nix^0.280.28.0up to date
 log^0.40.4.21up to date
 env_logger^0.110.11.3up to date
 async-trait^0.10.1.80up to date
 text_placeholder^0.50.5.0up to date
 chrono ⚠️^0.40.4.38maybe insecure
 lettre^0.110.11.7up to date
 sensors^0.20.2.2up to date
 rand^0.80.8.5up to date
 bollard^0.160.16.1up to date
 dasp_ring_buffer^0.110.11.0up to date
 num-bigint^0.40.4.4up to date
 num-integer^0.10.1.46up to date
 cron^0.120.12.1up to date

Dev dependencies

(1 total, all up-to-date)

CrateRequiredLatestStatus
 mockall^0.120.12.1up to date

Security Vulnerabilities

chrono: Potential segfault in `localtime_r` invocations

RUSTSEC-2020-0159

Impact

Unix-like operating systems may segfault due to dereferencing a dangling pointer in specific circumstances. This requires an environment variable to be set in a different thread than the affected functions. This may occur without the user's knowledge, notably in a third-party library.

Workarounds

No workarounds are known.

References