This project might be open to known security vulnerabilities , which can be prevented by tightening the version range of affected dependencies. Find detailed information at the bottom .
Crate rtc Dependencies (16 total, 4 outdated, 2 possibly insecure)
Crate Required Latest Status log ^0.4.210.4.28up to date serde ^1.0.1971.0.228up to date serde_json ^1.0.1141.0.145up to date rand ^0.8.50.9.2out of date bytes ^1.5.01.10.1up to date regex ^1.10.31.12.2up to date url ^2.5.02.5.7up to date rustls ⚠️ ^0.210.23.34out of date rcgen ^0.12.10.14.5out of date ring ⚠️ ^0.17.80.17.14maybe insecure sha2 ^0.10.80.10.9up to date hex ^0.4.30.4.3up to date pem ^3.0.33.0.6up to date lazy_static ^1.4.01.5.0up to date base64 ^0.22.00.22.1up to date thiserror ^1.0.582.0.17out of date
Dev dependencies (5 total, all up-to-date)
Crate rtc-datachannel Dependencies (2 total, all up-to-date)
Crate Required Latest Status bytes ^1.5.01.10.1up to date log ^0.4.210.4.28up to date
Dev dependencies (2 total, all up-to-date)
Crate Required Latest Status env_logger ^0.11.30.11.8up to date chrono ^0.4.350.4.42up to date
Crate rtc-dtls Dependencies (24 total, 7 outdated, 2 possibly insecure)
Crate Required Latest Status bytes ^1.5.01.10.1up to date byteorder ^1.5.01.5.0up to date rand_core ^0.6.40.9.3out of date p256 ^0.13.20.13.2up to date p384 ^0.13.00.13.1up to date rand ^0.8.50.9.2out of date hmac ^0.12.10.12.1up to date sha1 ^0.10.60.10.6up to date sha2 ^0.10.80.10.9up to date aes ^0.8.40.8.4up to date cbc ^0.1.20.1.2up to date aes-gcm ^0.10.30.10.3up to date ccm ^0.5.00.5.0up to date x25519-dalek ^2.0.12.0.1up to date x509-parser ^0.16.00.18.0out of date der-parser ^9.0.010.0.0out of date rcgen ^0.12.10.14.5out of date ring ⚠️ ^0.17.80.17.14maybe insecure rustls ⚠️ ^0.21.100.23.34out of date bincode ^1.3.32.0.1out of date serde ^1.0.1971.0.228up to date subtle ^2.5.02.6.1up to date log ^0.4.210.4.28up to date pem ^3.0.33.0.6up to date
Dev dependencies (8 total, all up-to-date)
Crate rtc-ice Dependencies (6 total, 1 outdated)
Crate Required Latest Status crc ^3.0.13.3.0up to date log ^0.4.210.4.28up to date rand ^0.8.50.9.2out of date serde ^1.0.1971.0.228up to date url ^2.5.02.5.7up to date bytes ^1.5.01.10.1up to date
Dev dependencies (13 total, 1 outdated)
Crate rtc-rtcp Dependencies (1 total, all up-to-date)
Crate Required Latest Status bytes ^1.5.01.10.1up to date
Crate rtc-rtp Dependencies (3 total, 1 outdated)
Crate Required Latest Status bytes ^1.5.01.10.1up to date rand ^0.8.50.9.2out of date serde ^1.0.1971.0.228up to date
Dev dependencies (2 total, 1 outdated)
Crate Required Latest Status chrono ^0.4.350.4.42up to date criterion ^0.5.10.7.0out of date
Crate rtc-sctp Dependencies (7 total, 2 outdated)
Crate Required Latest Status bytes ^1.5.01.10.1up to date fxhash ^0.2.10.2.1up to date rand ^0.8.50.9.2out of date slab ^0.4.90.4.11up to date thiserror ^1.0.572.0.17out of date log ^0.4.210.4.28up to date crc ^3.0.13.3.0up to date
Dev dependencies (2 total, all up-to-date)
Crate rtc-sdp Dependencies (2 total, 1 outdated)
Crate Required Latest Status url ^2.5.02.5.7up to date rand ^0.8.50.9.2out of date
Dev dependencies (1 total, 1 outdated)
Crate Required Latest Status criterion ^0.5.10.7.0out of date
Crate rtc-shared Dependencies (10 total, 2 outdated)
Crate Required Latest Status thiserror ^1.0.582.0.17out of date substring ^1.4.51.4.5up to date bytes ^1.5.01.10.1up to date aes-gcm ^0.10.30.10.3up to date url ^2.5.02.5.7up to date rcgen ^0.12.10.14.5out of date sec1 ^0.7.30.7.3up to date p256 ^0.13.20.13.2up to date aes ^0.8.40.8.4up to date retty ^0.29.00.29.0up to date
Crate rtc-srtp Dependencies (9 total, all up-to-date)
Crate Required Latest Status byteorder ^1.5.01.5.0up to date bytes ^1.5.01.10.1up to date hmac ^0.12.10.12.1up to date sha1 ^0.10.60.10.6up to date ctr ^0.9.20.9.2up to date aes ^0.8.40.8.4up to date subtle ^2.5.02.6.1up to date aead ^0.5.20.5.2up to date aes-gcm ^0.10.30.10.3up to date
Dev dependencies (1 total, all up-to-date)
Crate Required Latest Status lazy_static ^1.4.01.5.0up to date
Crate rtc-stun Dependencies (9 total, 2 outdated, 1 possibly insecure)
Crate Required Latest Status bytes ^1.5.01.10.1up to date lazy_static ^1.4.01.5.0up to date url ^2.5.02.5.7up to date rand ^0.8.50.9.2out of date base64 ^0.22.00.22.1up to date subtle ^2.5.02.6.1up to date crc ^3.0.13.3.0up to date ring ⚠️ ^0.17.80.17.14maybe insecure md5 ^0.7.00.8.0out of date
Dev dependencies (2 total, 1 outdated)
Crate Required Latest Status clap ^4.5.24.5.51up to date criterion ^0.5.10.7.0out of date
Crate rtc-turn Dependencies (2 total, all up-to-date)
Crate Required Latest Status bytes ^1.5.01.10.1up to date log ^0.4.210.4.28up to date
Dev dependencies (7 total, 1 outdated)
Crate rtc-interceptor No external dependencies! 🙌
Crate rtc-mdns No external dependencies! 🙌
Crate rtc-media No external dependencies! 🙌
Security Vulnerabilities rustls: `rustls::ConnectionCommon::complete_io` could fall into an infinite loop based on network inputRUSTSEC-2024-0336
If a close_notify alert is received during a handshake, complete_io
does not terminate.
Callers which do not call complete_io are not affected.
rustls-tokio and rustls-ffi do not call complete_io
and are not affected.
rustls::Stream and rustls::StreamOwned types use
complete_io and are affected.
Patched
>=0.23.5
>=0.22.4, <0.23.0
>=0.21.11, <0.22.0
ring: Some AES functions may panic when overflow checking is enabled.RUSTSEC-2025-0009
ring::aead::quic::HeaderProtectionKey::new_mask() may panic when overflow
checking is enabled. In the QUIC protocol, an attacker can induce this panic by
sending a specially-crafted packet. Even unintentionally it is likely to occur
in 1 out of every 2**32 packets sent and/or received.
On 64-bit targets operations using ring::aead::{AES_128_GCM, AES_256_GCM} may
panic when overflow checking is enabled, when encrypting/decrypting approximately
68,719,476,700 bytes (about 64 gigabytes) of data in a single chunk. Protocols
like TLS and SSH are not affected by this because those protocols break large
amounts of data into small chunks. Similarly, most applications will not
attempt to encrypt/decrypt 64GB of data in one chunk.
Overflow checking is not enabled in release mode by default, but
RUSTFLAGS="-C overflow-checks" or overflow-checks = true in the Cargo.toml
profile can override this. Overflow checking is usually enabled by default in
debug mode.