This project might be open to known security vulnerabilities, which can be prevented by tightening the version range of affected dependencies. Find detailed information at the bottom.

Crate cargo-xwin

Dependencies

(21 total, 2 outdated, 1 possibly insecure)

CrateRequiredLatestStatus
 anyhow^1.0.531.0.97up to date
 cargo-config2^0.1.40.1.32up to date
 cargo-options^0.7.10.7.5up to date
 clap^4.3.04.5.34up to date
 dirs^5.0.06.0.0out of date
 fs-err^3.0.03.1.0up to date
 humantime^2.1.02.2.0up to date
 indicatif^0.17.20.17.11up to date
 native-tls^0.2.110.2.14up to date
 paste^1.0.121.0.15up to date
 path-slash^0.2.00.2.1up to date
 rustls ⚠️^0.23.100.23.25maybe insecure
 rustls-pemfile^2.0.02.2.0up to date
 serde^1.0.2161.0.219up to date
 serde_json^1.0.1331.0.140up to date
 tar^0.4.430.4.44up to date
 tracing-subscriber^0.3.170.3.19up to date
 ureq^2.11.03.0.10out of date
 which^7.0.07.0.2up to date
 xwin^0.6.30.6.5up to date
 xz2^0.1.70.1.7up to date

Security Vulnerabilities

rustls: rustls network-reachable panic in `Acceptor::accept`

RUSTSEC-2024-0399

A bug introduced in rustls 0.23.13 leads to a panic if the received TLS ClientHello is fragmented. Only servers that use rustls::server::Acceptor::accept() are affected.

Servers that use tokio-rustls's LazyConfigAcceptor API are affected.

Servers that use tokio-rustls's TlsAcceptor API are not affected.

Servers that use rustls-ffi's rustls_acceptor_accept API are affected.