This project might be open to known security vulnerabilities , which can be prevented by tightening the version range of affected dependencies. Find detailed information at the bottom .
Crate actix-codec Dependencies (9 total, all up-to-date)
Dev dependencies (2 total, 1 outdated)
Crate actix-macros Dependencies (3 total, all up-to-date)
Crate Required Latest Status quote ^11.0.41up to date syn ^22.0.108up to date proc-macro2 ^1.0.601.0.103up to date
Dev dependencies (4 total, all up-to-date)
Crate actix-rt Dependencies (4 total, all up-to-date)
Dev dependencies (1 total, all up-to-date)
Crate Required Latest Status tokio ^1.44.21.48.0up to date
Crate actix-server Dependencies (10 total, all up-to-date)
Dev dependencies (9 total, all up-to-date)
Crate actix-service Dependencies (2 total, all up-to-date)
Dev dependencies (3 total, all up-to-date)
Crate actix-tls Dependencies (19 total, 4 outdated, 2 possibly insecure)
Dev dependencies (11 total, 1 outdated)
Crate actix-tracing Dependencies (4 total, all up-to-date)
Dev dependencies (2 total, all up-to-date)
Crate Required Latest Status actix-rt ^22.11.0up to date slab ^0.40.4.11up to date
Crate actix-utils Dependencies (2 total, all up-to-date)
Dev dependencies (3 total, all up-to-date)
Crate bytestring Dependencies (2 total, all up-to-date)
Crate Required Latest Status bytes ^1.21.10.1up to date serde_core ^11.0.228up to date
Dev dependencies (3 total, all up-to-date)
Crate local-channel Dependencies (3 total, all up-to-date)
Dev dependencies (2 total, all up-to-date)
Crate Required Latest Status futures-util ^0.3.170.3.31up to date tokio ^1.44.21.48.0up to date
Crate local-waker No external dependencies! 🙌
Security Vulnerabilities rustls: `rustls::ConnectionCommon::complete_io` could fall into an infinite loop based on network inputRUSTSEC-2024-0336
If a close_notify alert is received during a handshake, complete_io
does not terminate.
Callers which do not call complete_io are not affected.
rustls-tokio and rustls-ffi do not call complete_io
and are not affected.
rustls::Stream and rustls::StreamOwned types use
complete_io and are affected.
Patched
>=0.23.5
>=0.22.4, <0.23.0
>=0.21.11, <0.22.0
openssl: Use-After-Free in `Md::fetch` and `Cipher::fetch`RUSTSEC-2025-0022
When a Some(...) value was passed to the properties argument of either of these functions, a use-after-free would result.
In practice this would nearly always result in OpenSSL treating the properties as an empty string (due to CString::drop's behavior).
The maintainers thank quitbug for reporting this vulnerability to us.