This project might be open to known security vulnerabilities, which can be prevented by tightening the version range of affected dependencies. Find detailed information at the bottom.

Crate kvarn-quinn

Dependencies

(13 total, 1 outdated, 1 possibly insecure)

CrateRequiredLatestStatus
 async-io^2.02.3.2up to date
 async-std^1.111.12.0up to date
 bytes^11.6.0up to date
 futures-io^0.3.190.3.30up to date
 pin-project-lite^0.20.2.14up to date
 kvarn-quinn-proto^0.11.0-alpha1N/Aup to date
 rustc-hash^1.11.1.0up to date
 rustls ⚠️^0.21.100.23.5out of date
 smol^22.0.0up to date
 thiserror^1.0.211.0.59up to date
 tokio^1.28.11.37.0up to date
 tracing^0.1.100.1.40up to date
 kvarn-quinn-udp^0.5.0-alpha1N/Aup to date

Dev dependencies

(12 total, 2 outdated)

CrateRequiredLatestStatus
 anyhow^1.0.221.0.82up to date
 bencher^0.1.50.1.5up to date
 clap^44.5.4up to date
 crc^33.2.1up to date
 directories-next^22.0.0up to date
 rand^0.80.8.5up to date
 rcgen^0.12.00.13.1out of date
 rustls-pemfile^1.0.02.1.2out of date
 tokio^1.28.11.37.0up to date
 tracing-futures^0.2.00.2.5up to date
 tracing-subscriber^0.3.00.3.18up to date
 url^22.5.0up to date

Security Vulnerabilities

rustls: `rustls::ConnectionCommon::complete_io` could fall into an infinite loop based on network input

RUSTSEC-2024-0336

If a close_notify alert is received during a handshake, complete_io does not terminate.

Callers which do not call complete_io are not affected.

rustls-tokio and rustls-ffi do not call complete_io and are not affected.

rustls::Stream and rustls::StreamOwned types use complete_io and are affected.