This project might be open to known security vulnerabilities , which can be prevented by tightening the version range of affected dependencies. Find detailed information at the bottom .
Crate actix-codec
Dependencies (9 total, all up-to-date)
Dev dependencies (2 total, all up-to-date)
Crate actix-macros
Dependencies (3 total, all up-to-date)
Crate Required Latest Status quote ^1
1.0.40
up to date syn ^2
2.0.101
up to date proc-macro2 ^1.0.60
1.0.95
up to date
Dev dependencies (4 total, all up-to-date)
Crate actix-rt
Dependencies (4 total, all up-to-date)
Dev dependencies (1 total, all up-to-date)
Crate Required Latest Status tokio ^1.44.2
1.45.0
up to date
Crate actix-server
Dependencies (10 total, all up-to-date)
Dev dependencies (9 total, all up-to-date)
Crate actix-service
Dependencies (2 total, all up-to-date)
Dev dependencies (3 total, all up-to-date)
Crate actix-tls
Dependencies (19 total, 4 outdated, 2 possibly insecure)
Dev dependencies (11 total, all up-to-date)
Crate actix-tracing
Dependencies (4 total, all up-to-date)
Dev dependencies (2 total, all up-to-date)
Crate Required Latest Status actix-rt ^2
2.10.0
up to date slab ^0.4
0.4.9
up to date
Crate actix-utils
Dependencies (2 total, all up-to-date)
Dev dependencies (3 total, all up-to-date)
Crate bytestring
Dependencies (2 total, all up-to-date)
Crate Required Latest Status bytes ^1.2
1.10.1
up to date serde ^1
1.0.219
up to date
Dev dependencies (3 total, all up-to-date)
Crate local-channel
Dependencies (3 total, all up-to-date)
Dev dependencies (2 total, all up-to-date)
Crate Required Latest Status futures-util ^0.3.17
0.3.31
up to date tokio ^1.44.2
1.45.0
up to date
Crate local-waker
No external dependencies! 🙌
Security Vulnerabilities rustls
: `rustls::ConnectionCommon::complete_io` could fall into an infinite loop based on network inputRUSTSEC-2024-0336
If a close_notify
alert is received during a handshake, complete_io
does not terminate.
Callers which do not call complete_io
are not affected.
rustls-tokio
and rustls-ffi
do not call complete_io
and are not affected.
rustls::Stream
and rustls::StreamOwned
types use
complete_io
and are affected.
Patched
>=0.23.5
>=0.22.4, <0.23.0
>=0.21.11, <0.22.0
openssl
: Use-After-Free in `Md::fetch` and `Cipher::fetch`RUSTSEC-2025-0022
When a Some(...)
value was passed to the properties
argument of either of these functions, a use-after-free would result.
In practice this would nearly always result in OpenSSL treating the properties as an empty string (due to CString::drop
's behavior).
The maintainers thank quitbug for reporting this vulnerability to us.