This project contains known security vulnerabilities. Find detailed information at the bottom.

Crate dtn7

Dependencies

(33 total, 16 outdated, 1 insecure, 1 possibly insecure)

CrateRequiredLatestStatus
 actix^0.9.00.13.3out of date
 actix-rt^1.0.02.9.0out of date
 actix-web^2.0.04.5.1out of date
 actix-web-actors^2.0.04.3.0out of date
 anyhow^1.0.271.0.82up to date
 async-trait^0.1.260.1.80up to date
 attohttpc^0.120.28.0out of date
 bp7^0.6.10.10.6out of date
 bytes^0.5.41.6.0out of date
 clap^2.33.04.5.4out of date
 config^0.10.10.14.0out of date
 crossbeam^0.70.8.4out of date
 futures^0.3.40.3.30up to date
 futures-util^0.3.40.3.30up to date
 humansize^1.1.02.1.3out of date
 humantime^2.0.02.1.0up to date
 lazy_static^1.4.01.4.0up to date
 log^0.40.4.21up to date
 net2^0.20.2.39up to date
 parking_lot^0.100.12.2out of date
 pretty_env_logger^0.4.00.5.0out of date
 rand^0.70.8.5out of date
 serde^1.01.0.198up to date
 serde_bytes^0.110.11.14up to date
 serde_cbor^0.110.11.2up to date
 serde_json^1.01.0.116up to date
 tempfile^3.1.03.10.1up to date
 thiserror^1.0.131.0.59up to date
 tinytemplate^1.0.31.2.1up to date
 tokio ⚠️^0.2.131.37.0out of date
 tokio-util^0.3.10.7.10out of date
 url^2.12.5.0up to date
 ws ⚠️^0.9.10.9.2insecure

Security Vulnerabilities

ws: Insufficient size checks in outgoing buffer in ws allows remote attacker to run the process out of memory

RUSTSEC-2020-0043

Affected versions of this crate did not properly check and cap the growth of the outgoing buffer.

This allows a remote attacker to take down the process by growing the buffer of their (single) connection until the process runs out of memory it can allocate and is killed.

The flaw was corrected in the parity-ws fork (>=0.10.0) by disconnecting a client when the buffer runs full.

tokio: Data race when sending and receiving after closing a `oneshot` channel

RUSTSEC-2021-0124

If a tokio::sync::oneshot channel is closed (via the oneshot::Receiver::close method), a data race may occur if the oneshot::Sender::send method is called while the corresponding oneshot::Receiver is awaited or calling try_recv.

When these methods are called concurrently on a closed channel, the two halves of the channel can concurrently access a shared memory location, resulting in a data race. This has been observed to cause memory corruption.

Note that the race only occurs when both halves of the channel are used after the Receiver half has called close. Code where close is not used, or where the Receiver is not awaited and try_recv is not called after calling close, is not affected.

See tokio#4225 for more details.