This project contains known security vulnerabilities. Find detailed information at the bottom.

Crate prometheus

Dependencies

(10 total, 1 insecure)

CrateRequiredLatestStatus
 cfg-if^1.01.0.0up to date
 fnv^1.01.0.7up to date
 lazy_static^1.41.4.0up to date
 libc^0.20.2.93up to date
 memchr^2.32.3.4up to date
 parking_lot^0.110.11.1up to date
 protobuf^2.02.22.1insecure
 reqwest^0.110.11.3up to date
 thiserror^1.01.0.24up to date
 procfs^0.90.9.1up to date

Dev dependencies

(4 total, 1 insecure)

CrateRequiredLatestStatus
 criterion^0.30.3.4up to date
 getopts^0.20.2.21up to date
 hyper^0.140.14.7insecure
 tokio^1.01.5.0up to date

Security Vulnerabilities

protobuf: Out of Memory in stream::read_raw_bytes_into()

RUSTSEC-2019-0003

Affected versions of this crate called Vec::reserve() on user-supplied input.

This allows an attacker to cause an Out of Memory condition while calling the vulnerable method on untrusted data.

hyper: Multiple Transfer-Encoding headers misinterprets request payload

RUSTSEC-2021-0020

hyper's HTTP server code had a flaw that incorrectly understands some requests with multiple transfer-encoding headers to have a chunked payload, when it should have been rejected as illegal. This combined with an upstream HTTP proxy that understands the request payload boundary differently can result in "request smuggling" or "desync attacks".