This project might be open to known security vulnerabilities, which can be prevented by tightening the version range of affected dependencies. Find detailed information at the bottom.

Crate hyper-proxy2

Dependencies

(19 total, 4 outdated, 2 possibly insecure)

CrateRequiredLatestStatus
 bytes^1.51.10.1up to date
 futures-util^0.3.300.3.31up to date
 headers^0.40.4.1up to date
 http^1.01.3.1up to date
 hyper^1.01.6.0up to date
 hyper-rustls^0.26.00.27.7out of date
 hyper-tls^0.6.00.6.0up to date
 hyper-util^0.1.20.1.14up to date
 native-tls^0.2.110.2.14up to date
 openssl ⚠️^0.10.620.10.73maybe insecure
 pin-project-lite^0.2.130.2.16up to date
 rustls-native-certs^0.7.00.8.1out of date
 tokio^1.351.46.0up to date
 tokio-native-tls^0.3.10.3.1up to date
 tokio-openssl^0.6.40.6.5up to date
 tokio-rustls^0.25.00.26.2out of date
 tower-service^0.3.20.3.3up to date
 webpki ⚠️^0.220.22.4maybe insecure
 webpki-roots^0.26.01.0.1out of date

Dev dependencies

(5 total, all up-to-date)

CrateRequiredLatestStatus
 futures^0.3.300.3.31up to date
 http-body-util^0.1.00.1.3up to date
 hyper^1.01.6.0up to date
 hyper-util^0.1.20.1.14up to date
 tokio^1.351.46.0up to date

Security Vulnerabilities

webpki: webpki: CPU denial of service in certificate path building

RUSTSEC-2023-0052

When this crate is given a pathological certificate chain to validate, it will spend CPU time exponential with the number of candidate certificates at each step of path building.

Both TLS clients and TLS servers that accept client certificate are affected.

This was previously reported in https://github.com/briansmith/webpki/issues/69 and re-reported recently by Luke Malinowski.

webpki 0.22.1 included a partial fix and webpki 0.22.2 added further fixes.

openssl: Use-After-Free in `Md::fetch` and `Cipher::fetch`

RUSTSEC-2025-0022

When a Some(...) value was passed to the properties argument of either of these functions, a use-after-free would result.

In practice this would nearly always result in OpenSSL treating the properties as an empty string (due to CString::drop's behavior).

The maintainers thank quitbug for reporting this vulnerability to us.