This project contains known security vulnerabilities. Find detailed information at the bottom.

Crate starship

Dependencies

(42 total, 1 insecure)

CrateRequiredLatestStatus
 clap^2.33.32.33.3up to date
 ansi_term^0.12.10.12.1up to date
 directories-next^2.0.02.0.0up to date
 git2^0.13.240.13.24up to date
 toml^0.5.80.5.8up to date
 rust-ini^0.17.00.17.0up to date
 serde_json^1.0.721.0.72up to date
 rayon^1.5.11.5.1up to date
 log^0.4.140.4.14up to date
 starship-battery^0.7.90.7.9up to date
 path-slash^0.1.40.1.4up to date
 unicode-segmentation^1.8.01.8.0up to date
 gethostname^0.2.10.2.1up to date
 once_cell^1.8.01.8.0up to date
 chrono ⚠️^0.4.190.4.19insecure
 sys-info^0.9.10.9.1up to date
 byte-unit^4.0.134.0.13up to date
 yaml-rust^0.4.50.4.5up to date
 pest^2.1.32.1.3up to date
 pest_derive^2.1.02.1.0up to date
 regex^1.5.41.5.4up to date
 os_info^3.0.83.0.8up to date
 urlencoding^2.1.02.1.0up to date
 open^2.0.12.0.1up to date
 unicode-width^0.1.90.1.9up to date
 terminal_size^0.1.170.1.17up to date
 quick-xml^0.22.00.22.0up to date
 rand^0.8.40.8.4up to date
 serde^1.0.1301.0.130up to date
 indexmap^1.7.01.7.0up to date
 notify-rust^4.5.54.5.5up to date
 semver^1.0.41.0.4up to date
 which^4.2.24.2.2up to date
 shadow-rs^0.8.10.8.1up to date
 versions^3.0.33.0.3up to date
 strsim^0.10.00.10.0up to date
 sha-1^0.9.80.9.8up to date
 toml_edit^0.10.00.10.0up to date
 process_control^3.1.03.1.0up to date
 attohttpc^0.18.00.18.0up to date
 native-tls^0.2.80.2.8up to date
 shell-words^1.0.01.0.0up to date

Dev dependencies

(2 total, all up-to-date)

CrateRequiredLatestStatus
 tempfile^3.2.03.2.0up to date
 mockall^0.100.10.2up to date

Build dependencies

(1 total, all up-to-date)

CrateRequiredLatestStatus
 shadow-rs^0.8.10.8.1up to date

Crate starship_module_config_derive

Dependencies

(3 total, all up-to-date)

CrateRequiredLatestStatus
 proc-macro2~11.0.32up to date
 quote~11.0.10up to date
 syn~11.0.82up to date

Security Vulnerabilities

chrono: Potential segfault in `localtime_r` invocations

RUSTSEC-2020-0159

Impact

Unix-like operating systems may segfault due to dereferencing a dangling pointer in specific circumstances. This requires an environment variable to be set in a different thread than the affected functions. This may occur without the user's knowledge, notably in a third-party library.

Workarounds

No workarounds are known.

References