Affected versions of this crate called Vec::reserve() on user-supplied input.
This allows an attacker to cause an Out of Memory condition while calling the vulnerable method on untrusted data.
ekiden-grpcio 0.3.2
This project might be open to known security vulnerabilities, which can be prevented by tightening the version range of affected dependencies. Find detailed information at the bottom.
ekiden-grpcio
(5 total, 3 outdated, 1 possibly insecure)
Crate | Required | Latest | Status |
---|---|---|---|
ekiden-grpcio-sys | ^0.2.1 | 0.2.4 | up to date |
futures | ^0.1.15 | 0.3.30 | out of date |
libc | ^0.2 | 0.2.153 | up to date |
log | ^0.3 | 0.4.21 | out of date |
protobuf ⚠️ | ~2.0 | 3.4.0 | out of date |
(10 total, 3 outdated)
Crate | Required | Latest | Status |
---|---|---|---|
grpcio-proto | ^0.3.0 | 0.13.0 | out of date |
rand | ^0.3 | 0.8.5 | out of date |
serde | ^1.0 | 1.0.198 | up to date |
serde_derive | ^1.0 | 1.0.198 | up to date |
serde_json | ^1.0 | 1.0.116 | up to date |
slog | ^2.0 | 2.7.0 | up to date |
slog-async | ^2.1 | 2.8.0 | up to date |
slog-scope | ^4.0 | 4.4.0 | up to date |
slog-stdlog | ^3.0 | 4.1.1 | out of date |
slog-term | ^2.2 | 2.9.1 | up to date |
protobuf
: Out of Memory in stream::read_raw_bytes_into()Affected versions of this crate called Vec::reserve() on user-supplied input.
This allows an attacker to cause an Out of Memory condition while calling the vulnerable method on untrusted data.