This project might be open to known security vulnerabilities, which can be prevented by tightening the version range of affected dependencies. Find detailed information at the bottom.

Crate cargo-crev

Dependencies

(22 total, 15 outdated, 1 possibly insecure)

CrateRequiredLatestStatus
 atty^0.20.2.14up to date
 cargo^0.320.78.1out of date
 common_failures^0.10.2.0out of date
 crates_io_api^0.30.11.0out of date
 crev-common^0.60.25.4out of date
 crev-data^0.60.25.7out of date
 crev-lib^0.60.25.4out of date
 default^0.10.1.2up to date
 dirs^15.0.1out of date
 failure^0.10.1.8up to date
 geiger^0.20.4.12out of date
 insideout^0.20.2.0up to date
 quicli^0.30.4.0out of date
 resiter^0.30.5.0out of date
 semver^0.91.0.22out of date
 serde^11.0.198up to date
 serde_json^11.0.116up to date
 serde_yaml ⚠️^0.80.9.34+deprecatedout of date
 structopt^0.20.3.26out of date
 term^0.50.7.0out of date
 tokei^812.1.2out of date
 walkdir^22.5.0up to date

Security Vulnerabilities

serde_yaml: Uncontrolled recursion leads to abort in deserialization

RUSTSEC-2018-0005

Affected versions of this crate did not properly check for recursion while deserializing aliases.

This allows an attacker to make a YAML file with an alias referring to itself causing an abort.

The flaw was corrected by checking the recursion depth.