This project might be open to known security vulnerabilities, which can be prevented by tightening the version range of affected dependencies. Find detailed information at the bottom.

Crate etcommon-block

Dependencies

(9 total, 5 outdated, 1 possibly insecure)

CrateRequiredLatestStatus
 blockchain^0.20.9.2out of date
 etcommon-bigint^0.20.2.10up to date
 etcommon-block-core^0.10.3.1out of date
 etcommon-bloom^0.20.2.1up to date
 etcommon-rlp^0.20.2.5up to date
 etcommon-trie^0.30.4.0out of date
 libsecp256k1 ⚠️^0.10.7.1out of date
 secp256k1-plus^0.50.5.7up to date
 sha3^0.60.10.8out of date

Dev dependencies

(2 total, 1 outdated)

CrateRequiredLatestStatus
 etcommon-hexutil^0.20.2.4up to date
 rand^0.3.120.8.5out of date

Security Vulnerabilities

libsecp256k1: Flaw in Scalar::check_overflow allows side-channel timing attack

RUSTSEC-2019-0027

Versions of libsecp256k1 prior to 0.3.1 did not execute Scalar::check_overflow in constant time.

This allows an attacker to potentially leak information via a timing attack.

The flaw was corrected by modifying Scalar::check_overflow to execute in constant time.

libsecp256k1: libsecp256k1 allows overflowing signatures

RUSTSEC-2021-0076

libsecp256k1 accepts signatures whose R or S parameter is larger than the secp256k1 curve order, which differs from other implementations. This could lead to invalid signatures being verified.

The error is resolved in 0.5.0 by adding a check_overflow flag.