This project contains known security vulnerabilities. Find detailed information at the bottom.

Crate argminmax

Dependencies

(5 total, 1 insecure, 1 possibly insecure)

CrateRequiredLatestStatus
 arrow ⚠️>055.1.0maybe insecure
 arrow2 ⚠️>0.00.18.0insecure
 half^2.62.6.0up to date
 ndarray^0.16.10.16.1up to date
 num-traits^0.20.2.19up to date

Dev dependencies

(6 total, 1 outdated)

CrateRequiredLatestStatus
 codspeed-criterion-compat^2.10.12.10.1up to date
 criterion^0.5.10.6.0out of date
 half^2.62.6.0up to date
 rand^0.90.9.1up to date
 rstest^0.250.25.0up to date
 rstest_reuse^0.70.7.0up to date

Security Vulnerabilities

arrow: `BinaryArray` does not perform bound checks on reading values and offsets

RUSTSEC-2021-0116

BinaryArray performs insufficient validation on creation, which allows out-of-bounds reads in safe code.

arrow: `DecimalArray` does not perform bound checks on accessing values and offsets

RUSTSEC-2021-0117

DecimalArray performs insufficient bounds checks, which allows out-of-bounds reads in safe code if the length of the backing buffer is not a multiple of 16.

arrow: `FixedSizeBinaryArray` does not perform bound checks on accessing values and offsets

RUSTSEC-2021-0118

FixedSizeBinaryArray performs insufficient bounds checks, which allows out-of-bounds reads in safe code.

arrow2: Out of bounds access in public safe API

RUSTSEC-2025-0038

Rows::row_unchecked() allows out of bounds access to the underlying buffer without sufficient checks.

The arrow2 crate is no longer maintained, so there are no plans to fix this issue. Users are advised to migrate to the arrow crate, instead.