This project might be open to known security vulnerabilities, which can be prevented by tightening the version range of affected dependencies. Find detailed information at the bottom.

Crate rocksdb

Dependencies

(2 total, all up-to-date)

CrateRequiredLatestStatus
 libc^0.20.2.154up to date
 serde^11.0.200up to date

Dev dependencies

(5 total, all up-to-date)

CrateRequiredLatestStatus
 trybuild^1.01.0.92up to date
 tempfile^3.13.10.1up to date
 pretty_assertions^1.01.4.0up to date
 bincode^1.31.3.3up to date
 serde^11.0.200up to date

Crate librocksdb-sys

Dependencies

(6 total, 1 possibly insecure)

CrateRequiredLatestStatus
 libc^0.20.2.154up to date
 tikv-jemalloc-sys^0.50.5.4+5.3.0-patchedup to date
 lz4-sys ⚠️^1.91.9.4maybe insecure
 zstd-sys^2.02.0.10+zstd.1.5.6up to date
 libz-sys^1.11.1.16up to date
 bzip2-sys^0.10.1.11+1.0.8up to date

Dev dependencies

(2 total, all up-to-date)

CrateRequiredLatestStatus
 const-cstr^0.30.3.0up to date
 uuid^1.01.8.0up to date

Build dependencies

(4 total, 1 outdated)

CrateRequiredLatestStatus
 cc^1.01.0.96up to date
 bindgen^0.640.69.4out of date
 glob^0.30.3.1up to date
 pkg-config^0.30.3.30up to date

Security Vulnerabilities

lz4-sys: Memory corruption in liblz4

RUSTSEC-2022-0051

lz4-sys up to v1.9.3 bundles a version of liblz4 that is vulnerable to CVE-2021-3520.

Attackers could craft a payload that triggers an integer overflow upon decompression, causing an out-of-bounds write.

The flaw has been corrected in version v1.9.4 of liblz4, which is included in lz4-sys 1.9.4.