This project contains known security vulnerabilities. Find detailed information at the bottom.

Crate prometheus-client

Dependencies

(4 total, 1 insecure)

CrateRequiredLatestStatus
 dtoa^1.01.0.9up to date
 itoa^1.01.0.11up to date
 owning_ref ⚠️^0.40.4.1insecure
 prometheus-client-derive-text-encode^0.3.00.3.0up to date

Dev dependencies

(7 total, 2 outdated)

CrateRequiredLatestStatus
 async-std^11.12.0up to date
 criterion^0.30.5.1out of date
 http-types^22.12.0up to date
 pyo3^0.160.21.2out of date
 quickcheck^11.0.3up to date
 rand^0.8.40.8.5up to date
 tide^0.160.16.0up to date

Security Vulnerabilities

owning_ref: Multiple soundness issues in `owning_ref`

RUSTSEC-2022-0040

  • OwningRef::map_with_owner is unsound and may result in a use-after-free.
  • OwningRef::map is unsound and may result in a use-after-free.
  • OwningRefMut::as_owner and OwningRefMut::as_owner_mut are unsound and may result in a use-after-free.
  • The crate violates Rust's aliasing rules, which may cause miscompilations on recent compilers that emit the LLVM noalias attribute.

safer_owning_ref is a replacement crate which fixes these issues. No patched versions of the original crate are available, and the maintainer is unresponsive.