This project might be open to known security vulnerabilities, which can be prevented by tightening the version range of affected dependencies. Find detailed information at the bottom.

Crate ekiden-grpcio

Dependencies

(5 total, 3 outdated, 1 possibly insecure)

CrateRequiredLatestStatus
 ekiden-grpcio-sys^0.2.10.2.4up to date
 futures^0.1.150.3.30out of date
 libc^0.20.2.153up to date
 log^0.30.4.21out of date
 protobuf ⚠️~2.03.4.0out of date

Dev dependencies

(10 total, 3 outdated)

CrateRequiredLatestStatus
 grpcio-proto^0.3.00.13.0out of date
 rand^0.30.8.5out of date
 serde^1.01.0.198up to date
 serde_derive^1.01.0.198up to date
 serde_json^1.01.0.116up to date
 slog^2.02.7.0up to date
 slog-async^2.12.8.0up to date
 slog-scope^4.04.4.0up to date
 slog-stdlog^3.04.1.1out of date
 slog-term^2.22.9.1up to date

Security Vulnerabilities

protobuf: Out of Memory in stream::read_raw_bytes_into()

RUSTSEC-2019-0003

Affected versions of this crate called Vec::reserve() on user-supplied input.

This allows an attacker to cause an Out of Memory condition while calling the vulnerable method on untrusted data.