This project might be open to known security vulnerabilities, which can be prevented by tightening the version range of affected dependencies. Find detailed information at the bottom.

Crate libp2p-request-response

Dependencies

(12 total, 6 outdated, 1 possibly insecure)

CrateRequiredLatestStatus
 async-trait^0.10.1.80up to date
 bytes^11.6.0up to date
 futures^0.3.10.3.30up to date
 libp2p-core^0.28.00.41.2out of date
 libp2p-swarm^0.29.00.44.2out of date
 log^0.4.110.4.21up to date
 lru ⚠️^0.60.12.3out of date
 minicbor^0.80.24.0out of date
 rand^0.70.8.5out of date
 smallvec^1.6.11.13.2up to date
 unsigned-varint^0.70.8.0out of date
 wasm-timer^0.20.2.5up to date

Dev dependencies

(2 total, 1 outdated)

CrateRequiredLatestStatus
 async-std^1.6.21.12.0up to date
 rand^0.70.8.5out of date

Security Vulnerabilities

lru: Use after free in lru crate

RUSTSEC-2021-0130

Lru crate has use after free vulnerability.

Lru crate has two functions for getting an iterator. Both iterators give references to key and value. Calling specific functions, like pop(), will remove and free the value, and but it's still possible to access the reference of value which is already dropped causing use after free.