This project might be open to known security vulnerabilities, which can be prevented by tightening the version range of affected dependencies. Find detailed information at the bottom.

Crate argminmax

Dependencies

(5 total, 1 outdated, 2 possibly insecure)

CrateRequiredLatestStatus
 arrow ⚠️>053.2.0maybe insecure
 arrow2 ⚠️>0.00.18.0maybe insecure
 half^2.3.12.4.1up to date
 ndarray^0.15.60.16.1out of date
 num-traits^0.20.2.19up to date

Dev dependencies

(5 total, 2 outdated)

CrateRequiredLatestStatus
 codspeed-criterion-compat^2.3.32.7.2up to date
 criterion^0.5.10.5.1up to date
 rand^0.8.50.8.5up to date
 rstest^0.18.20.23.0out of date
 rstest_reuse^0.60.7.0out of date

Security Vulnerabilities

arrow: `BinaryArray` does not perform bound checks on reading values and offsets

RUSTSEC-2021-0116

BinaryArray performs insufficient validation on creation, which allows out-of-bounds reads in safe code.

arrow: `DecimalArray` does not perform bound checks on accessing values and offsets

RUSTSEC-2021-0117

DecimalArray performs insufficient bounds checks, which allows out-of-bounds reads in safe code if the length of the backing buffer is not a multiple of 16.

arrow: `FixedSizeBinaryArray` does not perform bound checks on accessing values and offsets

RUSTSEC-2021-0118

FixedSizeBinaryArray performs insufficient bounds checks, which allows out-of-bounds reads in safe code.

arrow2: Arrow2 allows double free in `safe` code

RUSTSEC-2022-0012

The struct Ffi_ArrowArray implements #derive(Clone) that is inconsistent with its custom implementation of Drop, resulting in a double free when cloned.

Cloning this struct in safe results in a segmentation fault, which is unsound.

This derive was removed from this struct. All users are advised to either:

  • bump the patch version of this crate (for versions v0.7,v0.8,v0.9), or
  • migrate to a more recent version of the crate (when using <0.7).

Doing so elimitates this vulnerability (code no longer compiles).