This project might be open to known security vulnerabilities, which can be prevented by tightening the version range of affected dependencies. Find detailed information at the bottom.

Crate capnp-futures

Dependencies

(3 total, 2 outdated, 1 possibly insecure)

CrateRequiredLatestStatus
 byteorder^1.21.5.0up to date
 capnp ⚠️^0.90.19.5out of date
 futures^0.1.120.3.30out of date

Dev dependencies

(2 total, 2 outdated, 1 possibly insecure)

CrateRequiredLatestStatus
 capnp ⚠️^0.90.19.5out of date
 quickcheck^0.21.0.3out of date

Security Vulnerabilities

capnp: out-of-bounds read possible when setting list-of-pointers

RUSTSEC-2022-0068

If a message consumer expects data of type "list of pointers", and if the consumer performs certain specific actions on such data, then a message producer can cause the consumer to read out-of-bounds memory. This could trigger a process crash in the consumer, or in some cases could allow exfiltration of private in-memory data.

The C++ Cap'n Proto library is also affected by this bug. See the advisory on the main Cap'n Proto repo for a succinct description of the exact circumstances in which the problem can arise.