This project might be open to known security vulnerabilities, which can be prevented by tightening the version range of affected dependencies. Find detailed information at the bottom.

Crate simd-json

Dependencies

(14 total, 8 outdated, 1 possibly insecure)

CrateRequiredLatestStatus
 alloc_counter^0.0.40.0.4up to date
 beef ⚠️^0.4.10.5.2out of date
 colored^1.92.1.0out of date
 float-cmp^0.60.9.0out of date
 getopts^0.20.2.21up to date
 halfbrown^0.10.2.5out of date
 itoa^0.41.0.11out of date
 jemallocator^0.30.5.4out of date
 perfcnt^0.50.8.0out of date
 ryu^11.0.17up to date
 serde^11.0.198up to date
 serde_json^11.0.116up to date
 simd-lite^0.1.00.1.0up to date
 value-trait^0.10.8.1out of date

Dev dependencies

(6 total, 3 outdated)

CrateRequiredLatestStatus
 core_affinity^0.50.8.1out of date
 criterion^0.30.5.1out of date
 getopts^0.20.2.21up to date
 proptest^0.91.4.0out of date
 serde_bytes^0.110.11.14up to date
 serde_derive^11.0.198up to date

Security Vulnerabilities

beef: beef::Cow lacks a Sync bound on its Send trait allowing for data races

RUSTSEC-2020-0122

Affected versions of this crate did not have a T: Sync bound in the Send impl for Cow<'_, T, U>. This allows users to create data races by making Cow contain types that are (Send && !Sync) like Cell<_> or RefCell<_>.

Such data races can lead to memory corruption.

The flaw was corrected in commit d1c7658 by adding trait bounds T: Sync and T::Owned: Send to the Send impl for Cow<'_, T, U>.