This project might be open to known security vulnerabilities, which can be prevented by tightening the version range of affected dependencies. Find detailed information at the bottom.

Crate librespot-playback

Dependencies

(19 total, 15 outdated, 1 possibly insecure)

CrateRequiredLatestStatus
 alsa^0.20.9.0out of date
 byteorder^1.31.5.0up to date
 cpal^0.80.15.3out of date
 futures^0.10.3.30out of date
 glib^0.90.19.5out of date
 gstreamer^0.150.22.4out of date
 gstreamer-app^0.150.22.0out of date
 jack^0.50.11.4out of date
 libc^0.20.2.153up to date
 libpulse-sys^0.0.01.21.0out of date
 librespot-audio^0.1.60.4.2out of date
 librespot-core^0.1.60.4.2out of date
 librespot-metadata^0.1.60.4.2out of date
 log^0.40.4.21up to date
 portaudio-rs ⚠️^0.30.3.2maybe insecure
 rodio^0.90.17.3out of date
 sdl2^0.320.36.0out of date
 shell-words^0.1.01.1.0out of date
 zerocopy^0.20.7.32out of date

Security Vulnerabilities

portaudio-rs: Stream callback function is not unwind safe

RUSTSEC-2019-0022

Affected versions of this crate is not panic safe within callback functions stream_callback and stream_finished_callback.

The call to user-provided closure might panic before a mem::forget call, which then causes a use after free that grants attacker to control the callback function pointer.

This allows an attacker to construct an arbitrary code execution .

The flaw was reported by Phosphorus15.