Affected version of this crate did not properly parse unknown fields when parsing a user-supplied input.
This allows an attacker to cause a stack overflow when parsing the mssage on untrusted data.
aesm-client 0.3.1
This project might be open to known security vulnerabilities, which can be prevented by tightening the version range of affected dependencies. Find detailed information at the bottom.
aesm-client
(10 total, 4 outdated, 1 possibly insecure)
Crate | Required | Latest | Status |
---|---|---|---|
byteorder | ^1.0 | 1.5.0 | up to date |
failure | ^0.1.1 | 0.1.8 | up to date |
failure_derive | ^0.1.1 | 0.1.8 | up to date |
lazy_static | ^1 | 1.5.0 | up to date |
libloading | ^0.5.2 | 0.8.8 | out of date |
protobuf ⚠️ | ^2.8.0 | 3.7.2 | out of date |
sgx-isa | ^0.3.0 | 0.4.1 | out of date |
sgxs | ^0.7.0 | 0.8.0 | out of date |
unix_socket2 | ^0.5.4 | 0.5.4 | up to date |
winapi | ^0.3.7 | 0.3.9 | up to date |
(3 total, 3 outdated)
Crate | Required | Latest | Status |
---|---|---|---|
report-test | ^0.3.0 | 0.5.0 | out of date |
sgx-isa | ^0.3.0 | 0.4.1 | out of date |
sgxs-loaders | ^0.2.0 | 0.5.0 | out of date |
protobuf
: Crash due to uncontrolled recursion in protobuf crateAffected version of this crate did not properly parse unknown fields when parsing a user-supplied input.
This allows an attacker to cause a stack overflow when parsing the mssage on untrusted data.