This project contains known security vulnerabilities. Find detailed information at the bottom.

Crate dtn7

Dependencies

(33 total, 17 outdated, 1 insecure, 1 possibly insecure)

CrateRequiredLatestStatus
 actix^0.9.00.13.5out of date
 actix-rt^1.0.02.10.0out of date
 actix-web^2.0.04.11.0out of date
 actix-web-actors^2.0.04.3.1+deprecatedout of date
 anyhow^1.0.271.0.98up to date
 async-trait^0.1.260.1.88up to date
 attohttpc^0.120.29.2out of date
 bp7^0.6.10.10.7out of date
 bytes^0.5.41.10.1out of date
 clap^2.33.04.5.40out of date
 config^0.10.10.15.11out of date
 crossbeam^0.70.8.4out of date
 futures^0.3.40.3.31up to date
 futures-util^0.3.40.3.31up to date
 humansize^1.1.02.1.3out of date
 humantime^2.0.02.2.0up to date
 lazy_static^1.4.01.5.0up to date
 log^0.40.4.27up to date
 net2^0.20.2.39up to date
 parking_lot^0.100.12.4out of date
 pretty_env_logger^0.4.00.5.0out of date
 rand^0.70.9.1out of date
 serde^1.01.0.219up to date
 serde_bytes^0.110.11.17up to date
 serde_cbor^0.110.11.2up to date
 serde_json^1.01.0.140up to date
 tempfile^3.1.03.20.0up to date
 thiserror^1.0.132.0.12out of date
 tinytemplate^1.0.31.2.1up to date
 tokio ⚠️^0.2.131.45.1out of date
 tokio-util^0.3.10.7.15out of date
 url^2.12.5.4up to date
 ws ⚠️^0.9.10.9.2insecure

Security Vulnerabilities

ws: Insufficient size checks in outgoing buffer in ws allows remote attacker to run the process out of memory

RUSTSEC-2020-0043

Affected versions of this crate did not properly check and cap the growth of the outgoing buffer.

This allows a remote attacker to take down the process by growing the buffer of their (single) connection until the process runs out of memory it can allocate and is killed.

The flaw was corrected in the parity-ws fork (>=0.10.0) by disconnecting a client when the buffer runs full.

tokio: Data race when sending and receiving after closing a `oneshot` channel

RUSTSEC-2021-0124

If a tokio::sync::oneshot channel is closed (via the oneshot::Receiver::close method), a data race may occur if the oneshot::Sender::send method is called while the corresponding oneshot::Receiver is awaited or calling try_recv.

When these methods are called concurrently on a closed channel, the two halves of the channel can concurrently access a shared memory location, resulting in a data race. This has been observed to cause memory corruption.

Note that the race only occurs when both halves of the channel are used after the Receiver half has called close. Code where close is not used, or where the Receiver is not awaited and try_recv is not called after calling close, is not affected.

See tokio#4225 for more details.