This project might be open to known security vulnerabilities, which can be prevented by tightening the version range of affected dependencies. Find detailed information at the bottom.

Crate pf_sandbox

Dependencies

(22 total, 10 outdated, 1 possibly insecure)

CrateRequiredLatestStatus
 byteorder^11.5.0up to date
 chrono ⚠️^0.40.4.38maybe insecure
 num-traits^0.20.2.18up to date
 getopts^0.20.2.21up to date
 gilrs-core^0.20.5.11out of date
 libusb^0.30.3.0up to date
 log^0.40.4.21up to date
 lyon^0.141.0.1out of date
 rand^0.7.00.8.5out of date
 rand_chacha^0.20.3.1out of date
 serde^11.0.198up to date
 serde_derive^11.0.198up to date
 serde_json^11.0.116up to date
 treeflection^0.10.1.35up to date
 treeflection_derive^0.40.4.0up to date
 winit^0.20.0-alpha30.29.15out of date
 winit_input_helper^0.4.0-alpha30.16.0out of date
 cgmath^0.170.18.0out of date
 vk-shader-macros^0.20.2.9up to date
 wgpu_glyph^0.40.22.0out of date
 wgpu^0.30.19.4out of date
 raw-window-handle^0.10.6.1out of date

Crate pf_tas

Dependencies

(5 total, 2 outdated)

CrateRequiredLatestStatus
 serde_json^1.01.0.116up to date
 serde_derive^1.01.0.198up to date
 serde^1.01.0.198up to date
 gdk^0.110.18.0out of date
 gtk^0.70.18.1out of date

Crate pf_cli

No external dependencies! 🙌

Crate pf_map_controllers

Dependencies

(5 total, 4 outdated)

CrateRequiredLatestStatus
 gtk^0.70.18.1out of date
 gdk^0.110.18.0out of date
 gilrs-core^0.20.5.11out of date
 serde_json^1.01.0.116up to date
 uuid^0.71.8.0out of date

Crate panic_handler

Dependencies

(1 total, 1 outdated)

CrateRequiredLatestStatus
 gtk^0.70.18.1out of date

Crate pf_sandbox_lib

Dependencies

(26 total, 14 outdated, 1 possibly insecure)

CrateRequiredLatestStatus
 backtrace^0.30.3.71up to date
 bincode^11.3.3up to date
 chrono ⚠️^0.40.4.38maybe insecure
 dirs^25.0.1out of date
 strum^0.150.26.2out of date
 strum_macros^0.150.26.2out of date
 num-traits^0.20.2.18up to date
 num-derive^0.20.4.2out of date
 env_logger^0.60.11.3out of date
 gilrs-core^0.20.5.11out of date
 log^0.40.4.21up to date
 matches^0.10.1.10up to date
 os_type^22.6.0up to date
 rand^0.70.8.5out of date
 reqwest^0.90.12.4out of date
 sha2^0.80.10.8out of date
 serde^11.0.198up to date
 serde_derive^11.0.198up to date
 serde_json^11.0.116up to date
 toml^0.50.8.12out of date
 treeflection^0.10.1.35up to date
 treeflection_derive^0.40.4.0up to date
 uuid^0.71.8.0out of date
 winit^0.20.0-alpha30.29.15out of date
 winit_input_helper^0.4.0-alpha30.16.0out of date
 zip^0.51.1.1out of date

Security Vulnerabilities

chrono: Potential segfault in `localtime_r` invocations

RUSTSEC-2020-0159

Impact

Unix-like operating systems may segfault due to dereferencing a dangling pointer in specific circumstances. This requires an environment variable to be set in a different thread than the affected functions. This may occur without the user's knowledge, notably in a third-party library.

Workarounds

No workarounds are known.

References