This project contains known security vulnerabilities. Find detailed information at the bottom.

Crate swc_common

Dependencies

(20 total, 7 outdated, 1 insecure)

CrateRequiredLatestStatus
 arbitrary^0.4.71.3.2out of date
 ast_node^0.7.20.9.7out of date
 atty^0.20.2.14up to date
 cfg-if^0.1.21.0.0out of date
 either^1.51.11.0up to date
 from_variant^0.1.30.1.7up to date
 fxhash^0.2.10.2.1up to date
 log^0.40.4.21up to date
 num-bigint^0.20.4.4out of date
 once_cell^11.19.0up to date
 owning_ref ⚠️^0.40.4.1insecure
 parking_lot^0.7.10.12.1out of date
 scoped-tls^11.0.1up to date
 serde^1.0.1191.0.198up to date
 sourcemap^68.0.1out of date
 string_cache^0.8.10.8.7up to date
 swc_eq_ignore_macros^0.10.1.3up to date
 swc_visit^0.2.30.5.13out of date
 termcolor^1.01.4.1up to date
 unicode-width^0.1.40.1.11up to date

Dev dependencies

(2 total, all up-to-date)

CrateRequiredLatestStatus
 rayon^11.10.0up to date
 serde_json^11.0.116up to date

Security Vulnerabilities

owning_ref: Multiple soundness issues in `owning_ref`

RUSTSEC-2022-0040

  • OwningRef::map_with_owner is unsound and may result in a use-after-free.
  • OwningRef::map is unsound and may result in a use-after-free.
  • OwningRefMut::as_owner and OwningRefMut::as_owner_mut are unsound and may result in a use-after-free.
  • The crate violates Rust's aliasing rules, which may cause miscompilations on recent compilers that emit the LLVM noalias attribute.

safer_owning_ref is a replacement crate which fixes these issues. No patched versions of the original crate are available, and the maintainer is unresponsive.