Affected versions of this crate called Vec::reserve() on user-supplied input.
This allows an attacker to cause an Out of Memory condition while calling the vulnerable method on untrusted data.
tract-tensorflow 0.3.3
This project might be open to known security vulnerabilities, which can be prevented by tightening the version range of affected dependencies. Find detailed information at the bottom.
tract-tensorflow
(8 total, 4 outdated, 1 possibly insecure)
Crate | Required | Latest | Status |
---|---|---|---|
derive-new | ^0.5 | 0.6.0 | out of date |
error-chain | ^0.12 | 0.12.4 | up to date |
log | ^0.4 | 0.4.21 | up to date |
ndarray | ^0.12 | 0.15.6 | out of date |
num-traits | ^0.2 | 0.2.18 | up to date |
protobuf ⚠️ | ^2.0 | 3.4.0 | out of date |
tensorflow | ^0 | 0.21.0 | up to date |
tract-core | ^0.3.3 | 0.21.3 | out of date |
(5 total, 5 outdated)
Crate | Required | Latest | Status |
---|---|---|---|
criterion | ^0.2 | 0.5.1 | out of date |
env_logger | ^0.6 | 0.11.3 | out of date |
ndarray-rand | ^0.9 | 0.14.0 | out of date |
proptest | ^0.9 | 1.4.0 | out of date |
rand | ^0.6 | 0.8.5 | out of date |
protobuf
: Out of Memory in stream::read_raw_bytes_into()Affected versions of this crate called Vec::reserve() on user-supplied input.
This allows an attacker to cause an Out of Memory condition while calling the vulnerable method on untrusted data.