This project might be open to known security vulnerabilities, which can be prevented by tightening the version range of affected dependencies. Find detailed information at the bottom.

Crate etcommon-block

Dependencies

(8 total, 2 outdated, 1 possibly insecure)

CrateRequiredLatestStatus
 etcommon-bigint^0.20.2.10up to date
 etcommon-block-core^0.30.3.1up to date
 etcommon-bloom^0.20.2.1up to date
 etcommon-rlp^0.20.2.5up to date
 etcommon-trie^0.40.4.0up to date
 libsecp256k1 ⚠️^0.10.7.1out of date
 secp256k1-plus^0.50.5.7up to date
 sha3^0.60.10.8out of date

Dev dependencies

(5 total, 1 outdated)

CrateRequiredLatestStatus
 etcommon-hexutil^0.20.2.4up to date
 rand^0.30.8.5out of date
 serde^1.01.0.200up to date
 serde_derive^1.01.0.200up to date
 serde_json^1.01.0.116up to date

Security Vulnerabilities

libsecp256k1: Flaw in Scalar::check_overflow allows side-channel timing attack

RUSTSEC-2019-0027

Versions of libsecp256k1 prior to 0.3.1 did not execute Scalar::check_overflow in constant time.

This allows an attacker to potentially leak information via a timing attack.

The flaw was corrected by modifying Scalar::check_overflow to execute in constant time.

libsecp256k1: libsecp256k1 allows overflowing signatures

RUSTSEC-2021-0076

libsecp256k1 accepts signatures whose R or S parameter is larger than the secp256k1 curve order, which differs from other implementations. This could lead to invalid signatures being verified.

The error is resolved in 0.5.0 by adding a check_overflow flag.