This project might be open to known security vulnerabilities, which can be prevented by tightening the version range of affected dependencies. Find detailed information at the bottom.

Crate tract-tensorflow

Dependencies

(10 total, 6 outdated, 1 possibly insecure)

CrateRequiredLatestStatus
 derive-new^0.50.6.0out of date
 error-chain^0.120.12.4up to date
 itertools^0.80.12.1out of date
 log^0.40.4.21up to date
 ndarray^0.120.15.6out of date
 num-traits^0.20.2.18up to date
 protobuf ⚠️^2.03.4.0out of date
 tensorflow^00.21.0up to date
 tract-core^0.4.20.21.4out of date
 tract-linalg^0.4.20.21.4out of date

Dev dependencies

(4 total, 4 outdated)

CrateRequiredLatestStatus
 criterion^0.30.5.1out of date
 env_logger^0.60.11.3out of date
 proptest^0.91.4.0out of date
 rand^0.70.8.5out of date

Security Vulnerabilities

protobuf: Out of Memory in stream::read_raw_bytes_into()

RUSTSEC-2019-0003

Affected versions of this crate called Vec::reserve() on user-supplied input.

This allows an attacker to cause an Out of Memory condition while calling the vulnerable method on untrusted data.