This project might be open to known security vulnerabilities, which can be prevented by tightening the version range of affected dependencies. Find detailed information at the bottom.

Crate maturin

Dependencies

(64 total, 6 outdated, 1 possibly insecure)

CrateRequiredLatestStatus
 anyhow^1.0.801.0.97up to date
 base64^0.21.00.22.1out of date
 bytesize^1.0.12.0.1out of date
 cargo-config2^0.1.240.1.32up to date
 cargo-options^0.7.20.7.5up to date
 cargo-xwin^0.18.40.18.4up to date
 cargo-zigbuild^0.19.70.19.8up to date
 cargo_metadata^0.19.00.19.2up to date
 cbindgen^0.28.00.28.0up to date
 cc^1.0.881.2.17up to date
 clap^4.0.04.5.34up to date
 clap_complete_command^0.6.10.6.1up to date
 configparser^3.0.33.1.0up to date
 console^0.15.40.15.11up to date
 dialoguer^0.11.00.11.0up to date
 dirs^5.0.06.0.0out of date
 dunce^1.0.21.0.5up to date
 fat-macho^0.4.80.4.9up to date
 flate2^1.0.181.1.0up to date
 fs-err^3.0.03.1.0up to date
 glob^0.3.00.3.2up to date
 goblin^0.9.00.9.3up to date
 ignore^0.4.200.4.23up to date
 indexmap^2.2.32.8.0up to date
 itertools^0.12.10.14.0out of date
 keyring^2.3.23.6.2out of date
 lddtree^0.3.70.3.7up to date
 minijinja^2.5.02.9.0up to date
 multipart^0.18.00.18.0up to date
 native-tls^0.2.80.2.14up to date
 normpath^1.1.11.3.0up to date
 once_cell^1.7.21.21.3up to date
 path-slash^0.2.10.2.1up to date
 pep440_rs^0.7.30.7.3up to date
 pep508_rs^0.9.20.9.2up to date
 platform-info^2.0.22.0.5up to date
 pretty_assertions^1.3.01.4.1up to date
 pyproject-toml^0.13.40.13.4up to date
 python-pkginfo^0.6.50.6.5up to date
 regex^1.7.01.11.1up to date
 rustc_version^0.4.00.4.1up to date
 rustls ⚠️^0.230.23.25maybe insecure
 rustls-pemfile^2.1.02.2.0up to date
 same-file^1.0.61.0.6up to date
 schemars^0.8.160.8.22up to date
 semver^1.0.221.0.26up to date
 serde^1.0.1971.0.219up to date
 serde_json^1.0.1141.0.140up to date
 sha2^0.10.30.10.8up to date
 tar^0.4.380.4.44up to date
 target-lexicon^0.13.00.13.2up to date
 tempfile^3.2.03.19.1up to date
 textwrap^0.16.10.16.2up to date
 thiserror^2.0.32.0.12up to date
 time^0.3.170.3.41up to date
 toml^0.8.100.8.20up to date
 toml_edit^0.22.60.22.24up to date
 tracing^0.1.360.1.41up to date
 tracing-subscriber^0.3.150.3.19up to date
 unicode-xid^0.2.40.2.6up to date
 ureq^2.9.43.0.10out of date
 url^2.5.02.5.4up to date
 wild^2.1.02.2.1up to date
 zip^2.0.02.5.0up to date

Dev dependencies

(9 total, 2 outdated)

CrateRequiredLatestStatus
 expect-test^1.4.11.5.1up to date
 fs4^0.12.00.13.1out of date
 indoc^2.0.32.0.6up to date
 pretty_assertions^1.3.01.4.1up to date
 rstest^0.22.00.25.0out of date
 rustversion^1.0.91.0.20up to date
 time^0.3.340.3.41up to date
 trycmd^0.15.00.15.9up to date
 which^7.0.07.0.2up to date

Security Vulnerabilities

rustls: rustls network-reachable panic in `Acceptor::accept`

RUSTSEC-2024-0399

A bug introduced in rustls 0.23.13 leads to a panic if the received TLS ClientHello is fragmented. Only servers that use rustls::server::Acceptor::accept() are affected.

Servers that use tokio-rustls's LazyConfigAcceptor API are affected.

Servers that use tokio-rustls's TlsAcceptor API are not affected.

Servers that use rustls-ffi's rustls_acceptor_accept API are affected.