This project contains known security vulnerabilities. Find detailed information at the bottom.

Crate starship

Dependencies

(41 total, 1 insecure)

CrateRequiredLatestStatus
 clap^3.0.93.0.10up to date
 clap_complete^3.0.43.0.4up to date
 ansi_term^0.12.10.12.1up to date
 directories-next^2.0.02.0.0up to date
 git2^0.13.250.13.25up to date
 toml^0.5.80.5.8up to date
 rust-ini^0.17.00.17.0up to date
 serde_json^1.0.751.0.75up to date
 rayon^1.5.11.5.1up to date
 log^0.4.140.4.14up to date
 starship-battery^0.7.90.7.9up to date
 path-slash^0.1.40.1.4up to date
 unicode-segmentation^1.8.01.8.0up to date
 gethostname^0.2.20.2.2up to date
 once_cell^1.9.01.9.0up to date
 chrono ⚠️^0.4.190.4.19insecure
 sys-info^0.9.10.9.1up to date
 byte-unit^4.0.134.0.13up to date
 yaml-rust^0.4.50.4.5up to date
 pest^2.1.32.1.3up to date
 pest_derive^2.1.02.1.0up to date
 regex^1.5.41.5.4up to date
 os_info^3.1.03.1.0up to date
 urlencoding^2.1.02.1.0up to date
 open^2.0.22.0.2up to date
 unicode-width^0.1.90.1.9up to date
 terminal_size^0.1.170.1.17up to date
 quick-xml^0.22.00.22.0up to date
 rand^0.8.40.8.4up to date
 serde^1.0.1331.0.133up to date
 indexmap^1.8.01.8.0up to date
 notify-rust^4.5.54.5.5up to date
 semver^1.0.41.0.4up to date
 which^4.2.24.2.2up to date
 shadow-rs^0.8.10.8.1up to date
 versions^4.0.04.0.0up to date
 strsim^0.10.00.10.0up to date
 sha-1^0.10.00.10.0up to date
 toml_edit^0.13.00.13.0up to date
 process_control^3.2.13.2.1up to date
 shell-words^1.0.01.0.0up to date

Dev dependencies

(2 total, all up-to-date)

CrateRequiredLatestStatus
 tempfile^3.2.03.3.0up to date
 mockall^0.110.11.0up to date

Build dependencies

(1 total, all up-to-date)

CrateRequiredLatestStatus
 shadow-rs^0.8.10.8.1up to date

Crate starship_module_config_derive

Dependencies

(3 total, all up-to-date)

CrateRequiredLatestStatus
 proc-macro2~11.0.36up to date
 quote~11.0.14up to date
 syn~11.0.85up to date

Security Vulnerabilities

chrono: Potential segfault in `localtime_r` invocations

RUSTSEC-2020-0159

Impact

Unix-like operating systems may segfault due to dereferencing a dangling pointer in specific circumstances. This requires an environment variable to be set in a different thread than the affected functions. This may occur without the user's knowledge, notably in a third-party library.

Workarounds

No workarounds are known.

References