This project might be open to known security vulnerabilities, which can be prevented by tightening the version range of affected dependencies. Find detailed information at the bottom.

Crate wasmtime-wasi

Dependencies

(23 total, 5 outdated, 1 possibly insecure)

CrateRequiredLatestStatus
 anyhow^1.0.221.0.98up to date
 async-trait^0.1.710.1.88up to date
 bitflags^2.02.9.1up to date
 bytes^1.41.10.1up to date
 cap-fs-ext^3.0.03.4.4up to date
 cap-net-ext^3.0.03.4.4up to date
 cap-rand^3.0.03.4.4up to date
 cap-std^3.0.03.4.4up to date
 cap-time-ext^3.0.03.4.4up to date
 fs-set-times^0.20.10.20.3up to date
 futures^0.3.270.3.31up to date
 io-extras^0.18.10.18.4up to date
 io-lifetimes^2.0.32.0.4up to date
 once_cell^1.12.01.21.3up to date
 rustix^0.38.311.0.7out of date
 system-interface^0.27.10.27.3up to date
 thiserror^1.0.432.0.12out of date
 tokio^1.26.01.46.1up to date
 tracing^0.1.260.1.41up to date
 url^2.3.12.5.4up to date
 wasmtime ⚠️^20.0.234.0.1out of date
 wiggle=20.0.234.0.1out of date
 windows-sys^0.52.00.60.2out of date

Dev dependencies

(5 total, 1 outdated, 1 possibly insecure)

CrateRequiredLatestStatus
 tempfile^3.1.03.20.0up to date
 test-log^0.20.2.18up to date
 tokio^1.26.01.46.1up to date
 tracing-subscriber^0.3.10.3.19up to date
 wasmtime ⚠️^20.0.234.0.1out of date

Security Vulnerabilities

wasmtime: Wasmtime doesn't fully sandbox all the Windows device filenames

RUSTSEC-2024-0438

This is an entry in the RustSec database for the Wasmtime security advisory located at https://github.com/bytecodealliance/wasmtime/security/advisories/GHSA-c2f5-jxjv-2hh8. For more information see the GitHub-hosted security advisory.

wasmtime: Race condition could lead to WebAssembly control-flow integrity and type safety violations

RUSTSEC-2024-0439

This is an entry in the RustSec database for the Wasmtime security advisory located at https://github.com/bytecodealliance/wasmtime/security/advisories/GHSA-7qmx-3fpx-r45m. For more information see the GitHub-hosted security advisory.