This project might be open to known security vulnerabilities, which can be prevented by tightening the version range of affected dependencies. Find detailed information at the bottom.

Crate s2n-quic-rustls

Dependencies

(6 total, 2 outdated, 1 possibly insecure)

CrateRequiredLatestStatus
 bytes^11.6.0up to date
 rustls ⚠️^0.210.23.7out of date
 rustls-pemfile^12.1.2out of date
 s2n-codec=0.37.00.37.0up to date
 s2n-quic-core=0.37.00.37.0up to date
 s2n-quic-crypto=0.37.00.37.0up to date

Dev dependencies

(1 total, all up-to-date)

CrateRequiredLatestStatus
 insta^11.39.0up to date

Security Vulnerabilities

rustls: `rustls::ConnectionCommon::complete_io` could fall into an infinite loop based on network input

RUSTSEC-2024-0336

If a close_notify alert is received during a handshake, complete_io does not terminate.

Callers which do not call complete_io are not affected.

rustls-tokio and rustls-ffi do not call complete_io and are not affected.

rustls::Stream and rustls::StreamOwned types use complete_io and are affected.