This project might be open to known security vulnerabilities, which can be prevented by tightening the version range of affected dependencies. Find detailed information at the bottom.

Crate exonum-testkit

Dependencies

(11 total, 5 outdated, 1 possibly insecure)

CrateRequiredLatestStatus
 actix-web ⚠️^0.6.154.5.1out of date
 exonum^0.9.71.0.0out of date
 failure^0.1.20.1.8up to date
 futures^0.1.230.3.30out of date
 log^0.4.30.4.21up to date
 reqwest^0.8.60.12.4out of date
 serde^1.0.101.0.200up to date
 serde_derive^1.0.101.0.200up to date
 serde_json^1.0.21.0.116up to date
 serde_urlencoded^0.5.20.7.1out of date
 tokio-core^0.1.170.1.18up to date

Dev dependencies

(5 total, 3 outdated, 1 possibly insecure)

CrateRequiredLatestStatus
 assert_matches^1.2.01.5.0up to date
 lazy_static^1.0.01.4.0up to date
 pretty_assertions^0.5.11.4.0out of date
 rand^0.4.20.8.5out of date
 thread_local ⚠️^0.3.51.1.8out of date

Security Vulnerabilities

actix-web: Multiple memory safety issues

RUSTSEC-2018-0019

Affected versions contain multiple memory safety issues, such as:

  • Unsoundly coercing immutable references to mutable references
  • Unsoundly extending lifetimes of strings
  • Adding the Send marker trait to objects that cannot be safely sent between threads

This may result in a variety of memory corruption scenarios, most likely use-after-free.

A significant refactoring effort has been conducted to resolve these issues.

thread_local: Data race in `Iter` and `IterMut`

RUSTSEC-2022-0006

In the affected version of this crate, {Iter, IterMut}::next used a weaker memory ordering when loading values than what was required, exposing a potential data race when iterating over a ThreadLocal's values.

Crates using Iter::next, or IterMut::next are affected by this issue.