This project might be open to known security vulnerabilities, which can be prevented by tightening the version range of affected dependencies. Find detailed information at the bottom.

Crate dragit

Dependencies

(24 total, 10 outdated, 1 possibly insecure)

CrateRequiredLatestStatus
 async-std^1.11.01.12.0up to date
 async_zip^0.0.90.0.17out of date
 bytesize^1.0.01.3.0up to date
 directories-next^2.0.02.0.0up to date
 futures^0.3.50.3.30up to date
 gdk^0.15.40.18.0out of date
 gio^0.15.40.19.5out of date
 glib^0.15.40.19.6out of date
 gtk^0.15.40.18.1out of date
 hex^0.4.20.4.3up to date
 hostname^0.3.00.4.0out of date
 libp2p ⚠️^0.44.00.53.2out of date
 log^0.4.80.4.21up to date
 env_logger^0.10.00.11.3out of date
 md-5^0.10.10.10.6up to date
 pnet^0.34.00.34.0up to date
 prost^0.11.90.12.6out of date
 serde^1.01.0.202up to date
 tempfile^3.2.03.10.1up to date
 tokio^1.29.11.37.0up to date
 tokio-util^0.7.30.7.11up to date
 toml^0.7.60.8.13out of date
 smallvec^1.6.11.13.2up to date
 walkdir^2.3.22.5.0up to date

Build dependencies

(1 total, 1 outdated)

CrateRequiredLatestStatus
 prost-build^0.6.10.12.6out of date

Security Vulnerabilities

libp2p: libp2p Lack of resource management DoS

RUSTSEC-2022-0084

libp2p allows a potential attacker to cause victim p2p node to run out of memory

The out of memory failure can cause crashes where libp2p is intended to be used within large scale networks leading to potential Denial of Service (DoS) vector

Users should upgrade or reference the DoS mitigation strategies.