This project might be open to known security vulnerabilities, which can be prevented by tightening the version range of affected dependencies. Find detailed information at the bottom.

Crate gluon_parser

Dependencies

(10 total, 8 outdated, 1 possibly insecure)

CrateRequiredLatestStatus
 codespan^0.20.11.1out of date
 codespan-reporting^0.20.11.1out of date
 collect-mac^0.1.00.1.0up to date
 gluon_base^0.11.20.18.2out of date
 itertools^0.80.12.1out of date
 lalrpop-util^0.160.20.2out of date
 log^0.40.4.21up to date
 ordered-float ⚠️^14.2.0out of date
 pretty^0.50.12.3out of date
 quick-error^1.0.02.0.1out of date

Dev dependencies

(3 total, 2 outdated)

CrateRequiredLatestStatus
 difference^22.0.0up to date
 env_logger^0.60.11.3out of date
 pretty_assertions^0.51.4.0out of date

Security Vulnerabilities

ordered-float: ordered_float:NotNan may contain NaN after panic in assignment operators

RUSTSEC-2020-0082

After using an assignment operators such as NotNan::add_assign, NotNan::mul_assign, etc., it was possible for the resulting NotNan value to contain a NaN. This could cause undefined behavior in safe code, because the safe NotNan::cmp method contains internal unsafe code that assumes the value is never NaN. (It could also cause undefined behavior in third-party unsafe code that makes the same assumption, as well as logic errors in safe code.)

This was mitigated starting in version 0.4.0, by panicking if the assigned value is NaN. However, in affected versions from 0.4.0 onward, code that uses the NotNan value during unwinding, or that continues after catching the panic, could still observe the invalid value and trigger undefined behavior.

The flaw is fully corrected in versions 1.1.1 and 2.0.1, by ensuring that the assignment operators panic without modifying the operand, if the result would be NaN.