This project might be open to known security vulnerabilities, which can be prevented by tightening the version range of affected dependencies. Find detailed information at the bottom.

Crate cranelift-codegen

Dependencies

(22 total, 9 outdated, 1 possibly insecure)

CrateRequiredLatestStatus
 anyhow^1.0.931.0.98up to date
 bumpalo^33.17.0up to date
 capstone^0.12.00.13.0out of date
 cranelift-assembler-x64^0.118.00.119.0out of date
 cranelift-bforest^0.118.00.119.0out of date
 cranelift-bitset^0.118.00.119.0out of date
 cranelift-codegen-shared^0.118.00.119.0out of date
 cranelift-control^0.118.00.119.0out of date
 cranelift-entity^0.118.00.119.0out of date
 gimli^0.31.00.31.1up to date
 hashbrown ⚠️^0.150.15.2maybe insecure
 log^0.4.80.4.27up to date
 postcard^1.0.81.1.1up to date
 pulley-interpreter=31.0.032.0.0out of date
 regalloc2^0.11.10.12.1out of date
 rustc-hash^2.0.02.1.1up to date
 serde^1.0.2151.0.219up to date
 serde_derive^1.0.1881.0.219up to date
 sha2^0.10.20.10.8up to date
 smallvec^1.6.11.15.0up to date
 souper-ir^2.1.02.1.0up to date
 target-lexicon^0.13.00.13.2up to date

Dev dependencies

(3 total, all up-to-date)

CrateRequiredLatestStatus
 criterion^0.5.00.5.1up to date
 env_logger^0.11.50.11.8up to date
 similar^2.1.02.7.0up to date

Security Vulnerabilities

hashbrown: Borsh serialization of HashMap is non-canonical

RUSTSEC-2024-0402

The borsh serialization of the HashMap did not follow the borsh specification. It potentially produced non-canonical encodings dependent on insertion order. It also did not perform canonicty checks on decoding.

This can result in consensus splits and cause equivalent objects to be considered distinct.

This was patched in 0.15.1.