This project might be open to known security vulnerabilities, which can be prevented by tightening the version range of affected dependencies. Find detailed information at the bottom.

Crate wasmtime-wasi

Dependencies

(28 total, 14 outdated, 1 possibly insecure)

CrateRequiredLatestStatus
 anyhow^1.0.221.0.98up to date
 async-trait^0.1.710.1.88up to date
 bitflags^2.02.9.1up to date
 bytes^1.41.10.1up to date
 cap-fs-ext^2.0.03.4.4out of date
 cap-net-ext^2.0.03.4.4out of date
 cap-rand^2.0.03.4.4out of date
 cap-std^2.0.03.4.4out of date
 cap-time-ext^2.0.03.4.4out of date
 fs-set-times^0.20.00.20.3up to date
 futures^0.3.270.3.31up to date
 io-extras^0.18.00.18.4up to date
 io-lifetimes^2.0.22.0.4up to date
 libc^0.2.600.2.174up to date
 log^0.4.80.4.27up to date
 once_cell^1.12.01.21.3up to date
 rustix^0.38.211.0.7out of date
 system-interface^0.26.00.27.3out of date
 thiserror^1.0.432.0.12out of date
 tokio^1.26.01.46.1up to date
 tracing^0.1.260.1.41up to date
 url^2.3.12.5.4up to date
 wasi-cap-std-sync=17.0.117.0.3out of date
 wasi-common=17.0.134.0.1out of date
 wasi-tokio=17.0.117.0.3out of date
 wasmtime ⚠️^17.0.134.0.1out of date
 wiggle=17.0.134.0.1out of date
 windows-sys^0.52.00.60.2out of date

Dev dependencies

(6 total, 1 outdated, 1 possibly insecure)

CrateRequiredLatestStatus
 libc^0.2.600.2.174up to date
 tempfile^3.1.03.20.0up to date
 test-log^0.20.2.18up to date
 tokio^1.26.01.46.1up to date
 tracing-subscriber^0.3.10.3.19up to date
 wasmtime ⚠️^17.0.134.0.1out of date

Security Vulnerabilities

wasmtime: Wasmtime doesn't fully sandbox all the Windows device filenames

RUSTSEC-2024-0438

This is an entry in the RustSec database for the Wasmtime security advisory located at https://github.com/bytecodealliance/wasmtime/security/advisories/GHSA-c2f5-jxjv-2hh8. For more information see the GitHub-hosted security advisory.