This project contains known security vulnerabilities. Find detailed information at the bottom.

Crate stalwart

Dependencies

(2 total, all up-to-date)

CrateRequiredLatestStatus
 tokio^1.471.50.0up to date
 jemallocator^0.5.00.5.4up to date

Crate types

Dependencies

(6 total, 1 possibly insecure)

CrateRequiredLatestStatus
 jmap-tools^0.10.1.4up to date
 hashify^0.20.2.9up to date
 serde^1.01.0.228up to date
 rkyv ⚠️^0.8.100.8.15maybe insecure
 compact_str^0.9.00.9.0up to date
 blake3^1.3.31.8.4up to date

Crate http

Dependencies

(25 total, 3 outdated, 1 insecure, 2 possibly insecure)

CrateRequiredLatestStatus
 smtp-proto^0.20.2.1up to date
 mail-parser^0.110.11.2up to date
 mail-builder^0.40.4.4up to date
 mail-auth^0.7.10.7.5up to date
 mail-send^0.50.5.2up to date
 tokio^1.471.50.0up to date
 hyper^1.0.11.9.0up to date
 hyper-util^0.1.10.1.20up to date
 http-body-util^0.1.00.1.3up to date
 async-stream^0.3.50.3.6up to date
 quick-xml^0.380.39.2out of date
 serde^1.01.0.228up to date
 serde_json^1.01.0.149up to date
 x509-parser^0.180.18.1up to date
 chrono ⚠️^0.40.4.44maybe insecure
 base64^0.220.22.1up to date
 pkcs8^0.10.20.10.2up to date
 rsa ⚠️^0.9.20.9.10insecure
 sha1^0.100.11.0out of date
 sha2^0.100.11.0out of date
 rev_lines^0.3.00.3.0up to date
 rkyv ⚠️^0.8.100.8.15maybe insecure
 form-data^0.6.00.6.0up to date
 mime^0.3.170.3.17up to date
 compact_str^0.9.00.9.0up to date

Crate http_proto

Dependencies

(8 total, all up-to-date)

CrateRequiredLatestStatus
 serde^1.01.0.228up to date
 serde_json^1.01.0.149up to date
 hyper^1.0.11.9.0up to date
 hyper-util^0.1.10.1.20up to date
 http-body-util^0.1.00.1.3up to date
 form_urlencoded^1.1.01.2.2up to date
 percent-encoding^2.3.12.3.2up to date
 compact_str^0.9.00.9.0up to date

Crate jmap

Dependencies

(34 total, 8 outdated, 1 insecure, 3 possibly insecure)

CrateRequiredLatestStatus
 calcard^0.30.3.2up to date
 smtp-proto^0.20.2.1up to date
 mail-parser^0.110.11.2up to date
 mail-builder^0.40.4.4up to date
 mail-send^0.50.5.2up to date
 mail-auth^0.7.10.7.5up to date
 sieve-rs^0.70.7.1up to date
 jmap-tools^0.10.1.4up to date
 serde^1.01.0.228up to date
 serde_json^1.01.0.149up to date
 hyper^1.0.11.9.0up to date
 hyper-util^0.1.10.1.20up to date
 http-body-util^0.1.00.1.3up to date
 tokio^1.471.50.0up to date
 futures-util^0.3.280.3.32up to date
 async-stream^0.3.50.3.6up to date
 base64^0.220.22.1up to date
 p256^0.130.13.2up to date
 hkdf^0.12.30.13.0out of date
 sha1^0.100.11.0out of date
 sha2^0.100.11.0out of date
 reqwest^0.120.13.2out of date
 tokio-tungstenite^0.280.29.0out of date
 tungstenite^0.280.29.0out of date
 chrono ⚠️^0.40.4.44maybe insecure
 rand^0.9.00.10.0out of date
 pkcs8^0.10.20.10.2up to date
 lz4_flex^0.120.13.0out of date
 aes-gcm ⚠️^0.10.10.10.3maybe insecure
 aes-gcm-siv^0.11.10.11.1up to date
 rsa ⚠️^0.9.20.9.10insecure
 rkyv ⚠️^0.8.100.8.15maybe insecure
 compact_str^0.9.00.9.0up to date
 hashify^0.20.2.9up to date

Crate jmap_proto

Dependencies

(9 total, 1 possibly insecure)

CrateRequiredLatestStatus
 jmap-tools^0.10.1.4up to date
 calcard^0.30.3.2up to date
 mail-parser^0.110.11.2up to date
 serde^1.01.0.228up to date
 ahash^0.8.20.8.12up to date
 serde_json^1.01.0.149up to date
 hashify^0.20.2.9up to date
 rkyv ⚠️^0.8.100.8.15maybe insecure
 compact_str^0.9.00.9.0up to date

Dev dependencies

(1 total, all up-to-date)

CrateRequiredLatestStatus
 tokio^1.471.50.0up to date

Crate email

Dependencies

(20 total, 4 outdated, 1 insecure, 3 possibly insecure)

CrateRequiredLatestStatus
 smtp-proto^0.20.2.1up to date
 mail-parser^0.110.11.2up to date
 mail-builder^0.40.4.4up to date
 sieve-rs^0.70.7.1up to date
 tokio^1.471.50.0up to date
 serde^1.01.0.228up to date
 serde_json^1.01.0.149up to date
 aes^0.8.30.8.4up to date
 aes-gcm ⚠️^0.10.10.10.3maybe insecure
 aes-gcm-siv^0.11.10.11.1up to date
 cbc^0.1.20.1.2up to date
 rasn^0.100.28.10out of date
 rasn-cms^0.100.28.10out of date
 rasn-pkix^0.100.28.10out of date
 rsa ⚠️^0.9.20.9.10insecure
 rand^0.80.10.0out of date
 sequoia-openpgp ⚠️^2.02.2.0maybe insecure
 hashify^0.20.2.9up to date
 rkyv ⚠️^0.8.100.8.15maybe insecure
 compact_str^0.9.00.9.0up to date

Dev dependencies

(1 total, all up-to-date)

CrateRequiredLatestStatus
 tokio^1.471.50.0up to date

Crate imap

Dependencies

(12 total, 1 outdated, 1 possibly insecure)

CrateRequiredLatestStatus
 mail-parser^0.110.11.2up to date
 mail-send^0.50.5.2up to date
 rustls ⚠️^0.23.50.23.37maybe insecure
 rustls-pemfile^2.02.2.0up to date
 tokio^1.471.50.0up to date
 tokio-rustls^0.260.26.4up to date
 parking_lot^0.120.12.5up to date
 ahash^0.80.8.12up to date
 md5^0.8.00.8.0up to date
 rand^0.9.00.10.0out of date
 indexmap^2.7.12.13.1up to date
 compact_str^0.9.00.9.0up to date

Crate imap_proto

Dependencies

(5 total, 1 possibly insecure)

CrateRequiredLatestStatus
 mail-parser^0.110.11.2up to date
 ahash^0.80.8.12up to date
 chrono ⚠️^0.40.4.44maybe insecure
 hashify^0.20.2.9up to date
 compact_str^0.9.00.9.0up to date

Dev dependencies

(1 total, all up-to-date)

CrateRequiredLatestStatus
 tokio^1.471.50.0up to date

Crate smtp

Dependencies

(34 total, 4 outdated, 3 possibly insecure)

CrateRequiredLatestStatus
 mail-auth^0.7.10.7.5up to date
 mail-send^0.50.5.2up to date
 mail-parser^0.110.11.2up to date
 mail-builder^0.40.4.4up to date
 smtp-proto^0.20.2.1up to date
 sieve-rs^0.70.7.1up to date
 ahash^0.80.8.12up to date
 rustls ⚠️^0.23.50.23.37maybe insecure
 rustls-pemfile^2.02.2.0up to date
 rustls-pki-types^11.14.0up to date
 tokio^1.471.50.0up to date
 tokio-rustls^0.260.26.4up to date
 webpki-roots^1.01.0.6up to date
 hyper^1.0.11.9.0up to date
 hyper-util^0.1.10.1.20up to date
 http-body-util^0.1.00.1.3up to date
 form_urlencoded^1.1.01.2.2up to date
 sha1^0.100.11.0out of date
 sha2^0.10.60.11.0out of date
 md5^0.8.00.8.0up to date
 rayon^1.51.11.0up to date
 parking_lot^0.120.12.5up to date
 regex^1.7.01.12.3up to date
 blake3^1.31.8.4up to date
 lru-cache^0.1.20.1.2up to date
 rand^0.9.00.10.0out of date
 x509-parser^0.180.18.1up to date
 reqwest^0.120.13.2out of date
 serde^1.01.0.228up to date
 serde_json^1.01.0.149up to date
 num_cpus^1.15.01.17.0up to date
 chrono ⚠️^0.40.4.44maybe insecure
 rkyv ⚠️^0.8.100.8.15maybe insecure
 compact_str^0.9.00.9.0up to date

Crate managesieve

Dependencies

(12 total, 2 possibly insecure)

CrateRequiredLatestStatus
 mail-parser^0.110.11.2up to date
 mail-send^0.50.5.2up to date
 sieve-rs^0.70.7.1up to date
 rustls ⚠️^0.23.50.23.37maybe insecure
 rustls-pemfile^2.02.2.0up to date
 tokio^1.471.50.0up to date
 tokio-rustls^0.260.26.4up to date
 parking_lot^0.120.12.5up to date
 ahash^0.80.8.12up to date
 md5^0.8.00.8.0up to date
 compact_str^0.9.00.9.0up to date
 rkyv ⚠️^0.8.100.8.15maybe insecure

Crate pop3

Dependencies

(5 total, 1 possibly insecure)

CrateRequiredLatestStatus
 mail-parser^0.110.11.2up to date
 mail-send^0.50.5.2up to date
 rustls ⚠️^0.23.50.23.37maybe insecure
 tokio^1.471.50.0up to date
 tokio-rustls^0.260.26.4up to date

Crate dav-proto

Dependencies

(8 total, 1 outdated, 1 possibly insecure)

CrateRequiredLatestStatus
 hashify^0.2.60.2.9up to date
 quick-xml^0.380.39.2out of date
 calcard^0.30.3.2up to date
 mail-parser^0.110.11.2up to date
 hyper^1.6.01.9.0up to date
 rkyv ⚠️^0.8.100.8.15maybe insecure
 chrono^0.4.400.4.44up to date
 compact_str^0.9.00.9.0up to date

Dev dependencies

(4 total, all up-to-date)

CrateRequiredLatestStatus
 calcard^0.30.3.2up to date
 serde^1.0.2171.0.228up to date
 serde_json^1.0.1381.0.149up to date
 chrono^0.4.400.4.44up to date

Crate dav

Dependencies

(7 total, 1 possibly insecure)

CrateRequiredLatestStatus
 calcard^0.30.3.2up to date
 hashify^0.20.2.9up to date
 hyper^1.0.11.9.0up to date
 percent-encoding^2.3.12.3.2up to date
 rkyv ⚠️^0.8.100.8.15maybe insecure
 compact_str^0.9.00.9.0up to date
 chrono^0.4.400.4.44up to date

Crate groupware

Dependencies

(8 total, 1 possibly insecure)

CrateRequiredLatestStatus
 calcard^0.30.3.2up to date
 hashify^0.20.2.9up to date
 tokio^1.471.50.0up to date
 rkyv ⚠️^0.8.100.8.15maybe insecure
 percent-encoding^2.3.12.3.2up to date
 compact_str^0.9.00.9.0up to date
 ahash^0.80.8.12up to date
 chrono^0.4.400.4.44up to date

Dev dependencies

(1 total, all up-to-date)

CrateRequiredLatestStatus
 tokio^1.471.50.0up to date

Crate spam-filter

Dependencies

(20 total, 3 outdated, 1 possibly insecure)

CrateRequiredLatestStatus
 smtp-proto^0.20.2.1up to date
 mail-parser^0.110.11.2up to date
 mail-builder^0.40.4.4up to date
 mail-auth^0.7.10.7.5up to date
 mail-send^0.50.5.2up to date
 tokio^1.471.50.0up to date
 psl^22.1.200up to date
 hyper^1.0.11.9.0up to date
 idna^1.01.1.0up to date
 reqwest^0.120.13.2out of date
 decancer^3.0.13.3.3up to date
 unicode-security^0.1.00.1.2up to date
 infer^0.190.19.0up to date
 sha1^0.100.11.0out of date
 sha2^0.10.60.11.0out of date
 compact_str^0.9.00.9.0up to date
 rkyv ⚠️^0.8.100.8.15maybe insecure
 serde^1.01.0.228up to date
 unicode-general-category^1.1.01.1.0up to date
 unicode-normalization^0.1.250.1.25up to date

Dev dependencies

(1 total, all up-to-date)

CrateRequiredLatestStatus
 tokio^1.471.50.0up to date

Crate nlp

Dependencies

(14 total, 1 outdated, 1 possibly insecure)

CrateRequiredLatestStatus
 xxhash-rust^0.8.50.8.15up to date
 serde^1.01.0.228up to date
 nohash^0.2.00.2.0up to date
 ahash^0.8.30.8.12up to date
 whatlang^0.180.18.0up to date
 rust-stemmers^1.21.2.0up to date
 jieba-rs^0.80.8.1up to date
 lru-cache^0.1.20.1.2up to date
 parking_lot^0.12.10.12.5up to date
 psl^22.1.200up to date
 maplit^1.0.21.0.2up to date
 hashify^0.2.10.2.9up to date
 rand^0.9.20.10.0out of date
 rkyv ⚠️^0.8.100.8.15maybe insecure

Dev dependencies

(2 total, 1 outdated)

CrateRequiredLatestStatus
 tokio^1.471.50.0up to date
 bincode^1.3.33.0.0out of date

Crate store

Dependencies

(44 total, 12 outdated, 4 possibly insecure)

CrateRequiredLatestStatus
 rocksdb^0.240.24.0up to date
 foundationdb^0.9.20.10.0out of date
 rusqlite^0.370.39.0out of date
 rust-s3^0.350.37.1out of date
 async-nats^0.440.47.0out of date
 azure_core^0.21.00.33.0out of date
 azure_storage^0.21.00.21.0up to date
 azure_storage_blobs^0.21.00.21.0up to date
 reqwest^0.120.13.2out of date
 tokio^1.471.50.0up to date
 r2d2^0.8.100.8.10up to date
 futures^0.30.3.32up to date
 rand^0.9.00.10.0out of date
 roaring^0.110.11.3up to date
 rayon^1.111.11.0up to date
 serde^1.01.0.228up to date
 ahash^0.8.20.8.12up to date
 xxhash-rust^0.8.50.8.15up to date
 farmhash^1.1.51.1.5up to date
 parking_lot^0.120.12.5up to date
 lru-cache^0.1.20.1.2up to date
 num_cpus^1.171.17.0up to date
 blake3^1.81.8.4up to date
 lz4_flex^0.120.13.0out of date
 deadpool-postgres^0.140.14.1up to date
 tokio-postgres^0.7.100.7.17up to date
 tokio-rustls^0.260.26.4up to date
 rustls ⚠️^0.210.23.37out of date
 rustls-pki-types^11.14.0up to date
 ring ⚠️^0.170.17.14maybe insecure
 bytes ⚠️^1.101.11.1maybe insecure
 mysql_async^0.360.36.2up to date
 serde_json^1.0.641.0.149up to date
 regex^1.121.12.3up to date
 flate2^1.11.1.9up to date
 redis^0.321.1.0out of date
 deadpool^0.120.13.0out of date
 arc-swap^1.6.01.9.0up to date
 bitpacking^0.9.20.9.3up to date
 memchr^2.72.8.0up to date
 rkyv ⚠️^0.8.100.8.15maybe insecure
 compact_str^0.9.00.9.0up to date
 zenoh^1.3.41.8.0up to date
 rdkafka^0.380.39.0out of date

Dev dependencies

(1 total, all up-to-date)

CrateRequiredLatestStatus
 tokio^1.471.50.0up to date

Crate directory

Dependencies

(29 total, 5 outdated, 2 possibly insecure)

CrateRequiredLatestStatus
 smtp-proto^0.20.2.1up to date
 mail-parser^0.110.11.2up to date
 mail-send^0.50.5.2up to date
 mail-builder^0.40.4.4up to date
 tokio^1.471.50.0up to date
 tokio-rustls^0.260.26.4up to date
 rustls ⚠️^0.23.50.23.37maybe insecure
 rustls-pki-types^11.14.0up to date
 ldap3^0.120.12.1up to date
 deadpool^0.100.13.0out of date
 async-trait^0.1.680.1.89up to date
 ahash^0.80.8.12up to date
 pwhash^11.0.0up to date
 password-hash^0.5.00.6.0out of date
 argon2^0.5.00.5.3up to date
 pbkdf2^0.12.10.12.2up to date
 scrypt^0.11.00.11.0up to date
 sha1^0.10.50.11.0out of date
 sha2^0.10.60.11.0out of date
 md5^0.8.00.8.0up to date
 futures^0.30.3.32up to date
 regex^1.7.01.12.3up to date
 serde^1.01.0.228up to date
 totp-rs^5.5.15.7.1up to date
 reqwest^0.120.13.2out of date
 serde_json^1.01.0.149up to date
 base64^0.220.22.1up to date
 rkyv ⚠️^0.8.100.8.15maybe insecure
 compact_str^0.9.00.9.0up to date

Dev dependencies

(1 total, all up-to-date)

CrateRequiredLatestStatus
 tokio^1.471.50.0up to date

Crate services

Dependencies

(18 total, 3 outdated, 1 insecure, 2 possibly insecure)

CrateRequiredLatestStatus
 smtp-proto^0.20.2.1up to date
 tokio^1.471.50.0up to date
 mail-parser^0.110.11.2up to date
 mail-builder^0.40.4.4up to date
 calcard^0.30.3.2up to date
 chrono ⚠️^0.40.4.44maybe insecure
 serde^1.01.0.228up to date
 serde_json^1.01.0.149up to date
 memory-stats^1.2.01.2.0up to date
 aes-gcm ⚠️^0.10.10.10.3maybe insecure
 aes-gcm-siv^0.11.10.11.1up to date
 rsa ⚠️^0.9.20.9.10insecure
 p256^0.130.13.2up to date
 hkdf^0.12.30.13.0out of date
 sha2^0.100.11.0out of date
 reqwest^0.120.13.2out of date
 base64^0.220.22.1up to date
 compact_str^0.9.00.9.0up to date

Crate utils

Dependencies

(35 total, 2 outdated, 1 insecure, 4 possibly insecure)

CrateRequiredLatestStatus
 rustls ⚠️^0.23.50.23.37maybe insecure
 rustls-pemfile^2.02.2.0up to date
 rustls-pki-types^11.14.0up to date
 tokio^1.471.50.0up to date
 tokio-rustls^0.260.26.4up to date
 serde^1.01.0.228up to date
 mail-auth^0.7.10.7.5up to date
 smtp-proto^0.20.2.1up to date
 mail-send^0.50.5.2up to date
 ahash^0.80.8.12up to date
 chrono ⚠️^0.40.4.44maybe insecure
 rand^0.9.00.10.0out of date
 webpki-roots^1.01.0.6up to date
 ring ⚠️^0.170.17.14maybe insecure
 base64^0.220.22.1up to date
 serde_json^1.01.0.149up to date
 rcgen^0.140.14.7up to date
 reqwest^0.120.13.2out of date
 x509-parser^0.180.18.1up to date
 pem^3.03.0.6up to date
 parking_lot^0.120.12.5up to date
 futures^0.30.3.32up to date
 regex^1.7.01.12.3up to date
 blake3^1.3.31.8.4up to date
 http-body-util^0.1.00.1.3up to date
 form_urlencoded^1.1.01.2.2up to date
 psl^22.1.200up to date
 quick_cache^0.6.90.6.21up to date
 fast-float ⚠️^0.2.00.2.0insecure
 rkyv ⚠️^0.8.100.8.15maybe insecure
 compact_str^0.9.00.9.0up to date
 xxhash-rust^0.8.50.8.15up to date
 farmhash^1.1.51.1.5up to date
 nohash-hasher^0.2.00.2.0up to date
 privdrop^0.5.30.5.6up to date

Dev dependencies

(1 total, all up-to-date)

CrateRequiredLatestStatus
 tokio^1.471.50.0up to date

Crate common

Dependencies

(63 total, 11 outdated, 1 insecure, 4 possibly insecure)

CrateRequiredLatestStatus
 sieve-rs^0.70.7.1up to date
 mail-parser^0.110.11.2up to date
 mail-builder^0.40.4.4up to date
 mail-auth^0.7.10.7.5up to date
 mail-send^0.50.5.2up to date
 smtp-proto^0.20.2.1up to date
 dns-update^0.1.50.1.6up to date
 calcard^0.30.3.2up to date
 ahash^0.8.20.8.12up to date
 parking_lot^0.12.10.12.5up to date
 regex^1.7.01.12.3up to date
 proxy-header^0.1.00.1.2up to date
 arc-swap^1.6.01.9.0up to date
 rustls ⚠️^0.23.50.23.37maybe insecure
 rustls-pemfile^2.02.2.0up to date
 rustls-pki-types^11.14.0up to date
 ring ⚠️^0.170.17.14maybe insecure
 tokio^1.471.50.0up to date
 tokio-rustls^0.260.26.4up to date
 futures^0.30.3.32up to date
 rcgen^0.120.14.7out of date
 reqwest^0.120.13.2out of date
 serde^1.01.0.228up to date
 serde_json^1.01.0.149up to date
 base64^0.220.22.1up to date
 x509-parser^0.180.18.1up to date
 pem^3.03.0.6up to date
 chrono ⚠️^0.40.4.44maybe insecure
 hyper^1.0.11.9.0up to date
 opentelemetry^0.290.31.0out of date
 opentelemetry_sdk^0.290.31.0out of date
 opentelemetry-otlp^0.290.31.1out of date
 opentelemetry-semantic-conventions^0.29.00.31.0out of date
 prometheus^0.140.14.0up to date
 imagesize^0.140.14.0up to date
 sha1^0.100.11.0out of date
 sha2^0.10.60.11.0out of date
 md5^0.8.00.8.0up to date
 whatlang^0.180.18.0up to date
 idna^1.01.1.0up to date
 decancer^3.0.13.3.3up to date
 unicode-security^0.1.00.1.2up to date
 infer^0.190.19.0up to date
 bincode^2.03.0.0out of date
 hostname^0.4.00.4.2up to date
 zip^6.08.5.0out of date
 pwhash^1.0.01.0.0up to date
 xxhash-rust^0.8.50.8.15up to date
 psl^22.1.200up to date
 aes-gcm-siv^0.11.10.11.1up to date
 biscuit^0.7.00.7.0up to date
 rsa ⚠️^0.9.20.9.10insecure
 p256^0.130.13.2up to date
 p384^0.130.13.1up to date
 num_cpus^1.13.11.17.0up to date
 hashify^0.20.2.9up to date
 rkyv ⚠️^0.8.100.8.15maybe insecure
 indexmap^2.7.12.13.1up to date
 tinyvec^1.9.01.11.0up to date
 compact_str^0.9.00.9.0up to date
 lz4_flex^0.120.13.0out of date
 privdrop^0.5.30.5.6up to date
 libc^0.2.1260.2.184up to date

Dev dependencies

(1 total, all up-to-date)

CrateRequiredLatestStatus
 tokio^1.471.50.0up to date

Crate trc

Dependencies

(12 total, 1 outdated, 1 possibly insecure)

CrateRequiredLatestStatus
 mail-auth^0.7.10.7.5up to date
 mail-parser^0.110.11.2up to date
 base64^0.22.10.22.1up to date
 serde^1.01.0.228up to date
 serde_json^1.0.1201.0.149up to date
 reqwest^0.120.13.2out of date
 rtrb^0.3.10.3.3up to date
 parking_lot^0.12.30.12.5up to date
 tokio^1.471.50.0up to date
 ahash^0.8.110.8.12up to date
 rkyv ⚠️^0.8.100.8.15maybe insecure
 compact_str^0.9.00.9.0up to date

Crate migration

Dependencies

(15 total, 3 outdated, 1 possibly insecure)

CrateRequiredLatestStatus
 mail-parser^0.110.11.2up to date
 mail-auth^0.7.10.7.5up to date
 smtp-proto^0.20.2.1up to date
 sieve-rs^0.70.7.1up to date
 calcard^0.10.3.2out of date
 tokio^1.471.50.0up to date
 serde^1.01.0.228up to date
 serde_json^1.01.0.149up to date
 rkyv ⚠️^0.8.100.8.15maybe insecure
 compact_str^0.9.00.9.0up to date
 bincode^1.3.33.0.0out of date
 lz4_flex^0.120.13.0out of date
 base64^0.220.22.1up to date
 futures^0.30.3.32up to date
 num_cpus^1.13.11.17.0up to date

Dev dependencies

(1 total, all up-to-date)

CrateRequiredLatestStatus
 tokio^1.471.50.0up to date

Crate stalwart-cli

Dependencies

(19 total, 5 outdated)

CrateRequiredLatestStatus
 jmap-client^0.30.4.0out of date
 mail-parser^0.110.11.2up to date
 reqwest^0.120.13.2out of date
 tokio^1.471.50.0up to date
 num_cpus^1.13.11.17.0up to date
 clap^4.1.64.6.0up to date
 prettytable-rs^0.10.00.10.0up to date
 rpassword^7.07.4.0up to date
 indicatif^0.17.00.18.4out of date
 console^0.150.16.3out of date
 serde^1.01.0.228up to date
 serde_json^1.01.0.149up to date
 csv^1.11.4.0up to date
 form_urlencoded^1.1.01.2.2up to date
 human-size^0.4.20.4.3up to date
 futures^0.3.280.3.32up to date
 pwhash^1.0.01.0.0up to date
 rand^0.9.00.10.0out of date
 mail-auth^0.7.10.7.5up to date

Crate tests

Dependencies

(1 total, all up-to-date)

CrateRequiredLatestStatus
 jemallocator^0.5.00.5.4up to date

Dev dependencies

(37 total, 2 outdated, 5 possibly insecure)

CrateRequiredLatestStatus
 calcard^0.30.3.2up to date
 smtp-proto^0.20.2.1up to date
 mail-send^0.50.5.2up to date
 mail-auth^0.7.10.7.5up to date
 mail-parser^0.110.11.2up to date
 mail-builder^0.4.40.4.4up to date
 sieve-rs^0.70.7.1up to date
 jmap-client^0.40.4.0up to date
 tokio^1.471.50.0up to date
 tokio-rustls^0.260.26.4up to date
 rustls ⚠️^0.23.50.23.37maybe insecure
 rustls-pemfile^2.02.2.0up to date
 rustls-pki-types^11.14.0up to date
 csv^1.11.4.0up to date
 rayon^1.5.11.11.0up to date
 flate2^1.0.171.1.9up to date
 serde^1.01.0.228up to date
 serde_json^1.01.0.149up to date
 reqwest^0.120.13.2out of date
 bytes ⚠️^1.4.01.11.1maybe insecure
 futures^0.30.3.32up to date
 ece^2.22.3.1up to date
 hyper^1.0.11.9.0up to date
 hyper-util^0.1.10.1.20up to date
 http-body-util^0.1.00.1.3up to date
 base64^0.220.22.1up to date
 ahash^0.80.8.12up to date
 serial_test^3.0.03.4.0up to date
 num_cpus^1.15.01.17.0up to date
 async-trait^0.1.680.1.89up to date
 chrono ⚠️^0.40.4.44maybe insecure
 ring ⚠️^0.170.17.14maybe insecure
 biscuit^0.7.00.7.0up to date
 form_urlencoded^1.1.01.2.2up to date
 rkyv ⚠️^0.8.100.8.15maybe insecure
 compact_str^0.9.00.9.0up to date
 quick-xml^0.380.39.2out of date

Crate proc_macros

Dependencies

(3 total, all up-to-date)

CrateRequiredLatestStatus
 syn^2.02.0.117up to date
 quote^1.01.0.45up to date
 proc-macro2^1.01.0.106up to date

Crate event_macro

Dependencies

(3 total, all up-to-date)

CrateRequiredLatestStatus
 syn^2.02.0.117up to date
 quote^1.01.0.45up to date
 proc-macro2^1.01.0.106up to date

Security Vulnerabilities

chrono: Potential segfault in `localtime_r` invocations

RUSTSEC-2020-0159

Impact

Unix-like operating systems may segfault due to dereferencing a dangling pointer in specific circumstances. This requires an environment variable to be set in a different thread than the affected functions. This may occur without the user's knowledge, notably in a third-party library.

Workarounds

No workarounds are known.

References

rsa: Marvin Attack: potential key recovery through timing sidechannels

RUSTSEC-2023-0071

Impact

Due to a non-constant-time implementation, information about the private key is leaked through timing information which is observable over the network. An attacker may be able to use that information to recover the key.

Patches

No patch is yet available, however work is underway to migrate to a fully constant-time implementation.

Workarounds

The only currently available workaround is to avoid using the rsa crate in settings where attackers are able to observe timing information, e.g. local use on a non-compromised computer is fine.

References

This vulnerability was discovered as part of the "Marvin Attack", which revealed several implementations of RSA including OpenSSL had not properly mitigated timing sidechannel attacks.

aes-gcm: Plaintext exposed in decrypt_in_place_detached even on tag verification failure

RUSTSEC-2023-0096

Summary

In the AES GCM implementation of decrypt_in_place_detached, the decrypted ciphertext (i.e. the correct plaintext) is exposed even if tag verification fails.

Impact

If a program using the aes-gcm crate's decrypt_in_place* APIs accesses the buffer after decryption failure, it will contain a decryption of an unauthenticated input. Depending on the specific nature of the program this may enable Chosen Ciphertext Attacks (CCAs) which can cause a catastrophic breakage of the cipher including full plaintext recovery.

Details

As seen in the implementation of decrypt_in_place_detached for AES GCM, if the tag verification fails, an error is returned. Because the decryption of the ciphertext is done in place, the plaintext contents are now exposed via buffer.

This should ideally not be the case - as noted in page 17 of NIST's publication Recommendation for Block Cipher Modes of Operation: Galois/Counter Mode (GCM) and GMAC:

In Step 8, the result of Step 7 is compared with the authentication tag that was received as an input: if they are identical, then the plaintext is returned; otherwise,FAIL is returned.

This is seems correctly addressed in the AES GCM SIV implementation, where the decrypted buffer is encrypted again before the error is returned - this fix is straightforward to implement in AES GCM. To ensure that these types of cases are covered during testing, it would be valuable to add test cases like 23, 24 etc from project wycheproof to ensure that when a bad tag is used, there is an error on decryption and that the plaintext value is not exposed.

PoC

To reproduce this issue, I'm using test case 23 from project wycheproof.

    let key = GenericArray::from_slice(&hex!("000102030405060708090a0b0c0d0e0f"));
    let nonce = GenericArray::from_slice(&hex!("505152535455565758595a5b"));
    let tag = GenericArray::from_slice(&hex!("d9847dbc326a06e988c77ad3863e6083")); // bad tag
    let mut ct = hex!("eb156d081ed6b6b55f4612f021d87b39");
    let msg = hex!("202122232425262728292a2b2c2d2e2f");
    let aad = hex!("");
    let cipher = Aes128Gcm::new(&key);
    let _plaintext = cipher.decrypt_in_place_detached(&nonce, &aad, &mut ct, &tag);
    assert_eq!(ct, msg);

rustls: `rustls::ConnectionCommon::complete_io` could fall into an infinite loop based on network input

RUSTSEC-2024-0336

If a close_notify alert is received during a handshake, complete_io does not terminate.

Callers which do not call complete_io are not affected.

rustls-tokio and rustls-ffi do not call complete_io and are not affected.

rustls::Stream and rustls::StreamOwned types use complete_io and are affected.

rustls: rustls network-reachable panic in `Acceptor::accept`

RUSTSEC-2024-0399

A bug introduced in rustls 0.23.13 leads to a panic if the received TLS ClientHello is fragmented. Only servers that use rustls::server::Acceptor::accept() are affected.

Servers that use tokio-rustls's LazyConfigAcceptor API are affected.

Servers that use tokio-rustls's TlsAcceptor API are not affected.

Servers that use rustls-ffi's rustls_acceptor_accept API are affected.

fast-float: Segmentation fault due to lack of bound check

RUSTSEC-2025-0003

In this case, the "fast_float::common::AsciiStr::first" method within the "AsciiStr" struct uses the unsafe keyword to reading from memory without performing bounds checking. Specifically, it directly dereferences a pointer offset by "self.ptr". Because of the above reason, the method accesses invalid memory address when it takes an empty string as its input. This approach violates Rust’s memory safety guarantees, as it can lead to invalid memory access if empty buffer is provided.

No patched version for fast-float crate has been released, but a patch is available in the fast-float2 fork.

ring: Some AES functions may panic when overflow checking is enabled.

RUSTSEC-2025-0009

ring::aead::quic::HeaderProtectionKey::new_mask() may panic when overflow checking is enabled. In the QUIC protocol, an attacker can induce this panic by sending a specially-crafted packet. Even unintentionally it is likely to occur in 1 out of every 2**32 packets sent and/or received.

On 64-bit targets operations using ring::aead::{AES_128_GCM, AES_256_GCM} may panic when overflow checking is enabled, when encrypting/decrypting approximately 68,719,476,700 bytes (about 64 gigabytes) of data in a single chunk. Protocols like TLS and SSH are not affected by this because those protocols break large amounts of data into small chunks. Similarly, most applications will not attempt to encrypt/decrypt 64GB of data in one chunk.

Overflow checking is not enabled in release mode by default, but RUSTFLAGS="-C overflow-checks" or overflow-checks = true in the Cargo.toml profile can override this. Overflow checking is usually enabled by default in debug mode.

sequoia-openpgp: Underflow in aes_key_unwrap function

RUSTSEC-2025-0136

The aes_key_unwrap function would panic if passed a ciphertext that was too short. In a debug build, it would panic due to a subtraction underflow. In a release build, it would use the small negative quantity to allocate a vector. Since the allocator expects an unsigned quantity, the negative value would be interpreted as a huge allocation. The allocator would then fail to allocate the memory and panic.

An attacker could trigger this panic by sending a victim an encrypted message whose PKESK or SKESK packet has been specially modified. When the victim decrypts the message, the program would crash.

rkyv: Potential Undefined Behaviors in `Arc<T>`/`Rc<T>` impls of `from_value` on OOM

RUSTSEC-2026-0001

The SharedPointer::alloc implementation for sync::Arc<T> and rc::Rc<T> in rkyv/src/impls/alloc/rc/atomic.rs (and rc.rs) does not check if the allocator returns a null pointer on OOM (Out of Memory).

This null pointer can flow through to SharedPointer::from_value, which calls Box::from_raw(ptr) with the null pointer. This triggers undefined behavior when utilizing safe deserialization APIs (such as rkyv::from_bytes or rkyv::deserialize_using) if an OOM condition occurs during the allocation of the shared pointer.

The issue is reachable through safe code and violates Rust's safety guarantees.

bytes: Integer overflow in `BytesMut::reserve`

RUSTSEC-2026-0007

In the unique reclaim path of BytesMut::reserve, the condition

if v_capacity >= new_cap + offset

uses an unchecked addition. When new_cap + offset overflows usize in release builds, this condition may incorrectly pass, causing self.cap to be set to a value that exceeds the actual allocated capacity. Subsequent APIs such as spare_capacity_mut() then trust this corrupted cap value and may create out-of-bounds slices, leading to UB.

This behavior is observable in release builds (integer overflow wraps), whereas debug builds panic due to overflow checks.

PoC

use bytes::*;

fn main() {
    let mut a = BytesMut::from(&b"hello world"[..]);
    let mut b = a.split_off(5);

    // Ensure b becomes the unique owner of the backing storage
    drop(a);

    // Trigger overflow in new_cap + offset inside reserve
    b.reserve(usize::MAX - 6);

    // This call relies on the corrupted cap and may cause UB & HBO
    b.put_u8(b'h');
}

Workarounds

Users of BytesMut::reserve are only affected if integer overflow checks are configured to wrap. When integer overflow is configured to panic, this issue does not apply.