This project might be open to known security vulnerabilities, which can be prevented by tightening the version range of affected dependencies. Find detailed information at the bottom.

Crate dragit

Dependencies

(30 total, 6 outdated, 1 possibly insecure)

CrateRequiredLatestStatus
 async-channel^2.3.12.5.0up to date
 astral-tokio-tar ⚠️^0.6.00.6.1maybe insecure
 bytesize^2.3.12.3.1up to date
 directories-next^2.0.02.0.0up to date
 futures^0.3.50.3.32up to date
 gdk^0.15.40.18.2out of date
 gio^0.15.40.22.6out of date
 glib^0.15.40.22.7out of date
 gtk^0.15.40.18.2out of date
 hex^0.4.20.4.3up to date
 hostname^0.4.20.4.2up to date
 libp2p^0.56.00.56.0up to date
 log^0.4.80.4.29up to date
 env_logger^0.11.90.11.10up to date
 md-5^0.11.00.11.0up to date
 pnet^0.35.00.35.0up to date
 prost^0.14.30.14.3up to date
 serde^1.01.0.228up to date
 tempfile^3.2.03.27.0up to date
 tokio^1.29.11.52.3up to date
 tokio-util^0.7.30.7.18up to date
 toml^1.0.31.1.2+spec-1.1.0up to date
 smallvec^1.6.11.15.1up to date
 rand_core^0.6.20.10.1out of date
 pnet_datalink^0.35.00.35.0up to date
 byteorder^1.4.31.5.0up to date
 zbus^5.14.05.15.0up to date
 zvariant^5.10.05.11.0up to date
 ipconfig^0.3.00.3.4up to date
 windows^0.32.00.62.2out of date

Build dependencies

(1 total, all up-to-date)

CrateRequiredLatestStatus
 prost-build^0.14.30.14.3up to date

Security Vulnerabilities

astral-tokio-tar: PAX Header Desynchronization in astral-tokio-tar

RUSTSEC-2026-0112

Versions of astral-tokio-tar prior to 0.6.1 contain a PAX header interpretation bug that allows manipulated entries to be made selectively visible or invisible during extraction with astral-tokio-tar versus other tar implementations. An attacker could use this differential to smuggle unexpected files onto a victim's filesystem.

astral-tokio-tar: `unpack_in` can chmod arbitrary directories by following symlinks

RUSTSEC-2026-0113

In versions 0.6.0 and earlier of astral-tokio-tar, the unpack_in API could inadvertently modify the permissions of external (i.e. non-archive) directories outside of the archive. An attacker could use this to contrite a tar archive that maliciously changes directory permissions outside of its intended hierarchy. This flaw only affects directories; individual file permissions cannot be modified via it.

See GHSA-j4xf-2g29-59ph for the equivalent flaw in the tar crate.