This project might be open to known security vulnerabilities, which can be prevented by tightening the version range of affected dependencies. Find detailed information at the bottom.

Crate sputnikvm

Dependencies

(11 total, 5 outdated, 1 possibly insecure)

CrateRequiredLatestStatus
 digest^0.60.10.7out of date
 etcommon-bigint^0.20.2.10up to date
 etcommon-block^0.50.5.2up to date
 etcommon-block-core^0.30.3.1up to date
 etcommon-rlp^0.20.2.5up to date
 libsecp256k1 ⚠️^0.10.7.1out of date
 log^0.40.4.21up to date
 ripemd160^0.60.10.0out of date
 secp256k1-plus^0.50.5.7up to date
 sha2^0.60.10.8out of date
 sha3^0.60.10.8out of date

Dev dependencies

(1 total, all up-to-date)

CrateRequiredLatestStatus
 etcommon-hexutil^0.20.2.4up to date

Security Vulnerabilities

libsecp256k1: Flaw in Scalar::check_overflow allows side-channel timing attack

RUSTSEC-2019-0027

Versions of libsecp256k1 prior to 0.3.1 did not execute Scalar::check_overflow in constant time.

This allows an attacker to potentially leak information via a timing attack.

The flaw was corrected by modifying Scalar::check_overflow to execute in constant time.

libsecp256k1: libsecp256k1 allows overflowing signatures

RUSTSEC-2021-0076

libsecp256k1 accepts signatures whose R or S parameter is larger than the secp256k1 curve order, which differs from other implementations. This could lead to invalid signatures being verified.

The error is resolved in 0.5.0 by adding a check_overflow flag.