This project might be open to known security vulnerabilities, which can be prevented by tightening the version range of affected dependencies. Find detailed information at the bottom.

Crate fac

Dependencies

(15 total, 4 outdated, 1 possibly insecure)

CrateRequiredLatestStatus
 atty^0.2.00.2.14up to date
 bigbro^0.50.5.2up to date
 clap^2.33.04.5.4out of date
 crude-profiler^0.1.70.1.7up to date
 ctrlc^3.03.4.4up to date
 git-version^0.3.40.3.9up to date
 internment ⚠️^0.3.120.8.2out of date
 lazy_static^1.4.01.4.0up to date
 libc^0.20.2.153up to date
 metrohash^1.0.11.0.6up to date
 notify^4.0.16.1.1out of date
 num_cpus^1.5.01.16.0up to date
 pathdiff^0.1.00.2.1out of date
 termcolor^1.0.51.4.1up to date
 tinyset^0.4.10.4.15up to date

Dev dependencies

(1 total, 1 outdated)

CrateRequiredLatestStatus
 quickcheck^0.9.01.0.3out of date

Security Vulnerabilities

internment: Use after free in ArcIntern::drop

RUSTSEC-2020-0017

ArcIntern::drop has a race condition where it can release memory which is about to get another user. The new user will get a reference to freed memory.

This was fixed by serializing access to an interned object while it is being deallocated.

Versions prior to 0.3.12 used stronger locking which avoided the problem.

internment: Intern<T>: Data race allowed on T

RUSTSEC-2021-0036

Affected versions of this crate unconditionally implements Sync for Intern<T>. This allows users to create data race on T: !Sync, which may lead to undefined behavior (for example, memory corruption).

The flaw was corrected in commit 2928a87 by adding the trait bound T: Sync in the Sync impl of Intern<T>.