This project might be open to known security vulnerabilities, which can be prevented by tightening the version range of affected dependencies. Find detailed information at the bottom.

Crate nebari

Dependencies

(11 total, 3 outdated, 1 possibly insecure)

CrateRequiredLatestStatus
 arc-bytes^0.3.20.3.5up to date
 backtrace^0.3.640.3.74up to date
 byteorder^1.4.31.5.0up to date
 crc^3.0.03.2.1up to date
 flume^0.10.100.11.1out of date
 lru ⚠️^0.7.00.12.5out of date
 num_cpus^1.13.11.16.0up to date
 once_cell^1.9.01.20.2up to date
 parking_lot^0.12.00.12.3up to date
 thiserror^1.0.302.0.3out of date
 tracing^0.1.300.1.40up to date

Dev dependencies

(3 total, all up-to-date)

CrateRequiredLatestStatus
 anyhow^1.0.531.0.93up to date
 nanorand^0.7.00.7.0up to date
 tempfile^3.3.03.14.0up to date

Security Vulnerabilities

lru: Use after free in lru crate

RUSTSEC-2021-0130

Lru crate has use after free vulnerability.

Lru crate has two functions for getting an iterator. Both iterators give references to key and value. Calling specific functions, like pop(), will remove and free the value, and but it's still possible to access the reference of value which is already dropped causing use after free.