This project might be open to known security vulnerabilities, which can be prevented by tightening the version range of affected dependencies. Find detailed information at the bottom.

Crate syd

Dependencies

(51 total, 3 outdated, 1 possibly insecure)

CrateRequiredLatestStatus
 anyhow^1.01.0.83up to date
 argv^0.10.1.11up to date
 bitflags=1.32.5.0out of date
 const-hex^1.111.11.3up to date
 env_logger^0.110.11.3up to date
 errno^0.30.3.9up to date
 getargs^0.50.5.0up to date
 globset^0.40.4.14up to date
 ipnetwork^0.200.20.0up to date
 itoa^1.01.0.11up to date
 libc^0.20.2.154up to date
 libloading^0.80.8.3up to date
 libseccomp^0.30.3.0up to date
 libseccomp-sys^0.20.2.1up to date
 log^0.40.4.21up to date
 md5^0.70.7.0up to date
 mimalloc2-rust^0.30.3.1up to date
 nix=0.26.40.28.0out of date
 nonempty^0.100.10.0up to date
 num_cpus^1.161.16.0up to date
 once_cell^1.191.19.0up to date
 openat2^0.10.1.2up to date
 parking_lot^0.120.12.2up to date
 parse-size^1.01.0.0up to date
 procfs=0.15.10.16.0out of date
 regex^1.101.10.4up to date
 rs_sha1^0.10.1.3up to date
 rs_sha3_256^0.10.1.2up to date
 rs_sha3_384^0.10.1.2up to date
 rs_sha3_512^0.10.1.2up to date
 rusty_pool^0.70.7.0up to date
 serde^1.01.0.201up to date
 serde_json^1.01.0.117up to date
 smallvec^1.131.13.2up to date
 io-uring^0.60.6.4up to date
 shellexpand^3.1.03.1.0up to date
 sendfd^0.40.4.3up to date
 pentacle^1.01.0.0up to date
 lexis^0.20.2.2up to date
 goblin^0.80.8.2up to date
 glob^0.30.3.1up to date
 crossbeam^0.80.8.4up to date
 hashbrown^0.140.14.5up to date
 slotmap^1.01.0.7up to date
 clap^4.54.5.4up to date
 libcgroups^0.30.3.2up to date
 libcontainer^0.30.3.2up to date
 liboci-cli^0.30.3.2up to date
 oci-spec^0.60.6.5up to date
 tabwriter^1.41.4.0up to date
 chrono ⚠️^0.40.4.38maybe insecure

Dev dependencies

(5 total, all up-to-date)

CrateRequiredLatestStatus
 criterion^0.50.5.1up to date
 lazy_static^11.4.0up to date
 strum^0.260.26.2up to date
 strum_macros^0.260.26.2up to date
 tempfile^3.103.10.1up to date

Security Vulnerabilities

chrono: Potential segfault in `localtime_r` invocations

RUSTSEC-2020-0159

Impact

Unix-like operating systems may segfault due to dereferencing a dangling pointer in specific circumstances. This requires an environment variable to be set in a different thread than the affected functions. This may occur without the user's knowledge, notably in a third-party library.

Workarounds

No workarounds are known.

References