This project might be open to known security vulnerabilities, which can be prevented by tightening the version range of affected dependencies. Find detailed information at the bottom.

Crate bioyino-metric

Dependencies

(9 total, 3 outdated, 1 possibly insecure)

CrateRequiredLatestStatus
 bytes^0.41.6.0out of date
 capnp ⚠️^0.100.19.3out of date
 combine^3.64.6.7out of date
 failure^0.10.1.8up to date
 failure_derive^0.10.1.8up to date
 lazysort^0.20.2.1up to date
 num-traits^0.20.2.18up to date
 serde^1.01.0.198up to date
 serde_derive^1.01.0.198up to date

Security Vulnerabilities

capnp: out-of-bounds read possible when setting list-of-pointers

RUSTSEC-2022-0068

If a message consumer expects data of type "list of pointers", and if the consumer performs certain specific actions on such data, then a message producer can cause the consumer to read out-of-bounds memory. This could trigger a process crash in the consumer, or in some cases could allow exfiltration of private in-memory data.

The C++ Cap'n Proto library is also affected by this bug. See the advisory on the main Cap'n Proto repo for a succinct description of the exact circumstances in which the problem can arise.