Affected versions of this crate called Vec::reserve() on user-supplied input.
This allows an attacker to cause an Out of Memory condition while calling the vulnerable method on untrusted data.
aesm-client 0.1.0
This project might be open to known security vulnerabilities, which can be prevented by tightening the version range of affected dependencies. Find detailed information at the bottom.
aesm-client
(7 total, 2 outdated, 1 possibly insecure)
Crate | Required | Latest | Status |
---|---|---|---|
byteorder | ^1.0 | 1.5.0 | up to date |
failure | ^0.1.1 | 0.1.8 | up to date |
failure_derive | ^0.1.1 | 0.1.8 | up to date |
lazy_static | ^1 | 1.4.0 | up to date |
protobuf ⚠️ | ^1.2.2 | 3.4.0 | out of date |
sgxs | ^0.6.0 | 0.8.0 | out of date |
unix_socket2 | ^0.5.4 | 0.5.4 | up to date |
(1 total, 1 outdated)
Crate | Required | Latest | Status |
---|---|---|---|
sgx-isa | ^0.2.0 | 0.4.1 | out of date |
protobuf
: Out of Memory in stream::read_raw_bytes_into()Affected versions of this crate called Vec::reserve() on user-supplied input.
This allows an attacker to cause an Out of Memory condition while calling the vulnerable method on untrusted data.