This project might be open to known security vulnerabilities , which can be prevented by tightening the version range of affected dependencies. Find detailed information at the bottom .
Crate shotover
Dependencies (38 total, 3 outdated, 1 possibly insecure)
Dev dependencies (1 total, all up-to-date)
Build dependencies (1 total, all up-to-date)
Crate Required Latest Status cc ^1.0
1.2.0
up to date
Crate shotover-proxy
Dev dependencies (11 total, 1 outdated)
Crate test-helpers
Dependencies (11 total, 1 possibly insecure)
Crate custom-transforms-example
No external dependencies! 🙌
Crate ec2-cargo
Dependencies (2 total, all up-to-date)
Crate windsock-cloud-docker
No external dependencies! 🙌
Security Vulnerabilities rustls
: `rustls::ConnectionCommon::complete_io` could fall into an infinite loop based on network inputRUSTSEC-2024-0336
If a close_notify
alert is received during a handshake, complete_io
does not terminate.
Callers which do not call complete_io
are not affected.
rustls-tokio
and rustls-ffi
do not call complete_io
and are not affected.
rustls::Stream
and rustls::StreamOwned
types use
complete_io
and are affected.
Patched
>=0.23.5
>=0.22.4, <0.23.0
>=0.21.11, <0.22.0