This project might be open to known security vulnerabilities, which can be prevented by tightening the version range of affected dependencies. Find detailed information at the bottom.

Crate validify

Dependencies

(12 total, 1 outdated, 1 possibly insecure)

CrateRequiredLatestStatus
 card-validate^2.32.4.0up to date
 chrono^0.4.240.4.38up to date
 idna^0.51.0.2out of date
 indexmap^22.5.0up to date
 lazy_static^1.4.01.5.0up to date
 phonenumber ⚠️^0.3.20.3.6+8.13.36maybe insecure
 regex^1.7.31.10.6up to date
 serde^1.0.1521.0.210up to date
 serde_json^11.0.128up to date
 unic-ucd-common^0.90.9.0up to date
 url^2.3.12.5.2up to date
 validify_derive^1.4.01.4.0up to date

Security Vulnerabilities

phonenumber: phonenumber: panic on parsing crafted phonenumber inputs

RUSTSEC-2024-0369

Impact

The phonenumber parsing code may panic due to a reachable assert! guard on the phonenumber string.

In a typical deployment of rust-phonenumber, this may get triggered by feeding a maliciously crafted phonenumber, e.g. over the network, specifically strings of the form +dwPAA;phone-context=AA, where the "number" part potentially parses as a number larger than 2^56.

Since f69abee1/0.3.4/#52.

0.2.x series is not affected.

Patches

Patches have been published as version 0.3.6+8.13.36.