This project might be open to known security vulnerabilities, which can be prevented by tightening the version range of affected dependencies. Find detailed information at the bottom.

Crate actix-server

Dependencies

(11 total, 5 outdated, 1 possibly insecure)

CrateRequiredLatestStatus
 actix-codec ⚠️^0.2.00.5.2out of date
 actix-rt^1.0.02.9.0out of date
 actix-service^1.0.12.0.2out of date
 actix-utils^1.0.43.0.1out of date
 futures^0.3.10.3.30up to date
 log^0.40.4.21up to date
 mio^0.6.190.8.11out of date
 mio-uds^0.6.70.6.8up to date
 net2^0.20.2.39up to date
 num_cpus^1.111.16.0up to date
 slab^0.40.4.9up to date

Dev dependencies

(3 total, 2 outdated)

CrateRequiredLatestStatus
 actix-testing^1.0.01.0.1up to date
 bytes^0.51.6.0out of date
 env_logger^0.70.11.3out of date

Security Vulnerabilities

actix-codec: Use-after-free in Framed due to lack of pinning

RUSTSEC-2020-0049

Affected versions of this crate did not require the buffer wrapped in Framed to be pinned, but treated it as if it had a fixed location in memory. This may result in a use-after-free.

The flaw was corrected by making the affected functions accept Pin<&mut Self> instead of &mut self.