This project might be open to known security vulnerabilities, which can be prevented by tightening the version range of affected dependencies. Find detailed information at the bottom.

Crate crayon

Dependencies

(9 total, 5 outdated, 1 possibly insecure)

CrateRequiredLatestStatus
 bincode^1.0.11.3.3up to date
 cgmath^0.16.10.18.0out of date
 crossbeam-deque ⚠️^0.5.10.8.5out of date
 failure^0.1.20.1.8up to date
 gl^0.10.00.14.0out of date
 glutin^0.18.00.31.3out of date
 log^0.4.50.4.21up to date
 serde^1.0.791.0.198up to date
 uuid^0.7.11.8.0out of date

Dev dependencies

(1 total, 1 outdated)

CrateRequiredLatestStatus
 rand^0.5.50.8.5out of date

Security Vulnerabilities

crossbeam-deque: Data race in crossbeam-deque

RUSTSEC-2021-0093

In the affected version of this crate, the result of the race condition is that one or more tasks in the worker queue can be popped twice instead of other tasks that are forgotten and never popped. If tasks are allocated on the heap, this can cause double free and a memory leak. If not, this still can cause a logical bug.

Crates using Stealer::steal, Stealer::steal_batch, or Stealer::steal_batch_and_pop are affected by this issue.

Credits to @kmaork for discovering, reporting and fixing the bug.