This project might be open to known security vulnerabilities, which can be prevented by tightening the version range of affected dependencies. Find detailed information at the bottom.

Crate wasmtime-wasi

Dependencies

(23 total, 7 outdated, 1 possibly insecure)

CrateRequiredLatestStatus
 anyhow^1.0.221.0.99up to date
 async-trait^0.1.710.1.89up to date
 bitflags^2.02.9.4up to date
 bytes^1.41.10.1up to date
 cap-fs-ext^3.0.03.4.4up to date
 cap-net-ext^3.0.03.4.4up to date
 cap-rand^3.0.03.4.4up to date
 cap-std^3.0.03.4.4up to date
 cap-time-ext^3.0.03.4.4up to date
 fs-set-times^0.20.10.20.3up to date
 futures^0.3.270.3.31up to date
 io-extras^0.18.10.19.0out of date
 io-lifetimes^2.0.33.0.1out of date
 once_cell^1.12.01.21.3up to date
 rustix^0.38.311.1.2out of date
 system-interface^0.27.10.27.3up to date
 thiserror^1.0.432.0.16out of date
 tokio^1.26.01.47.1up to date
 tracing^0.1.260.1.41up to date
 url^2.3.12.5.7up to date
 wasmtime ⚠️^20.0.236.0.2out of date
 wiggle=20.0.236.0.2out of date
 windows-sys^0.52.00.61.0out of date

Dev dependencies

(5 total, 1 outdated, 1 possibly insecure)

CrateRequiredLatestStatus
 tempfile^3.1.03.22.0up to date
 test-log^0.20.2.18up to date
 tokio^1.26.01.47.1up to date
 tracing-subscriber^0.3.10.3.20up to date
 wasmtime ⚠️^20.0.236.0.2out of date

Security Vulnerabilities

wasmtime: Wasmtime doesn't fully sandbox all the Windows device filenames

RUSTSEC-2024-0438

This is an entry in the RustSec database for the Wasmtime security advisory located at https://github.com/bytecodealliance/wasmtime/security/advisories/GHSA-c2f5-jxjv-2hh8. For more information see the GitHub-hosted security advisory.

wasmtime: Race condition could lead to WebAssembly control-flow integrity and type safety violations

RUSTSEC-2024-0439

This is an entry in the RustSec database for the Wasmtime security advisory located at https://github.com/bytecodealliance/wasmtime/security/advisories/GHSA-7qmx-3fpx-r45m. For more information see the GitHub-hosted security advisory.