This project might be open to known security vulnerabilities, which can be prevented by tightening the version range of affected dependencies. Find detailed information at the bottom.

Crate frugalos

Dependencies

(34 total, 24 outdated, 1 possibly insecure)

CrateRequiredLatestStatus
 atomic_immut^0.10.1.4up to date
 bytecodec^0.40.4.15up to date
 cannyls^0.90.10.0out of date
 cannyls_rpc^0.10.3.1out of date
 clap^24.5.4out of date
 fibers^0.10.1.13up to date
 fibers_http_server^0.10.2.0out of date
 fibers_rpc^0.20.3.4out of date
 fibers_tasque^0.10.1.2up to date
 frugalos_config^0.81.2.0out of date
 frugalos_core^0.11.2.0out of date
 frugalos_mds^0.121.2.0out of date
 frugalos_raft^0.91.2.0out of date
 frugalos_segment^0.121.2.0out of date
 futures^0.10.3.30out of date
 hostname^0.10.4.0out of date
 httpcodec^0.20.2.3up to date
 jemalloc-ctl^0.20.5.4out of date
 jemallocator^0.1.80.5.4out of date
 libfrugalos^0.5.00.7.0out of date
 num_cpus^11.16.0up to date
 prometrics^0.10.1.13up to date
 raftlog^0.50.6.0out of date
 rustracing^0.10.6.0out of date
 rustracing_jaeger^0.10.9.0out of date
 serde^11.0.198up to date
 serde_derive^11.0.198up to date
 serde_ignored^0.0.40.1.10out of date
 serde_yaml ⚠️^0.80.9.34+deprecatedout of date
 siphasher^0.21.0.1out of date
 slog^22.7.0up to date
 sloggers^0.32.2.0out of date
 trackable^0.2.211.3.0out of date
 url^12.5.0out of date

Dev dependencies

(1 total, all up-to-date)

CrateRequiredLatestStatus
 tempdir^0.30.3.7up to date

Security Vulnerabilities

serde_yaml: Uncontrolled recursion leads to abort in deserialization

RUSTSEC-2018-0005

Affected versions of this crate did not properly check for recursion while deserializing aliases.

This allows an attacker to make a YAML file with an alias referring to itself causing an abort.

The flaw was corrected by checking the recursion depth.