This project might be open to known security vulnerabilities, which can be prevented by tightening the version range of affected dependencies. Find detailed information at the bottom.

Crate x86

Dependencies

(4 total, 3 outdated, 1 possibly insecure)

CrateRequiredLatestStatus
 bit_field^0.10.10.10.2up to date
 bitflags1.*2.5.0out of date
 phf^0.8.00.11.2out of date
 raw-cpuid ⚠️^9.0.011.0.1out of date

Dev dependencies

(2 total, 1 outdated)

CrateRequiredLatestStatus
 klogger^0.0.60.0.16out of date
 libc0.2.*0.2.153up to date

Security Vulnerabilities

raw-cpuid: Optional `Deserialize` implementations lacking validation

RUSTSEC-2021-0089

When activating the non-default feature serialize, most structs implement serde::Deserialize without sufficient validation. This allows breaking invariants in safe code, leading to:

  • Undefined behavior in as_string() methods (which use std::str::from_utf8_unchecked() internally).
  • Panics due to failed assertions.

See https://github.com/gz/rust-cpuid/issues/43.