This project contains known security vulnerabilities. Find detailed information at the bottom.

Crate swc_common

Dependencies

(26 total, 8 outdated, 1 insecure)

CrateRequiredLatestStatus
 ahash^0.7.40.8.11out of date
 anyhow^1.0.451.0.81up to date
 arbitrary^11.3.2up to date
 ast_node^0.7.50.9.6out of date
 atty^0.20.2.14up to date
 cfg-if^0.1.21.0.0out of date
 debug_unreachable^0.1.10.1.1up to date
 either^1.51.10.0up to date
 from_variant^0.1.30.1.7up to date
 num-bigint^0.20.4.4out of date
 once_cell^11.19.0up to date
 owning_ref ⚠️^0.40.4.1insecure
 parking_lot^0.110.12.1out of date
 rkyv^0.7.280.7.44up to date
 rustc-hash^1.1.01.1.0up to date
 scoped-tls^11.0.1up to date
 serde^1.0.1191.0.197up to date
 siphasher^0.3.91.0.1out of date
 sourcemap^68.0.0out of date
 string_cache^0.8.10.8.7up to date
 swc_eq_ignore_macros^0.10.1.3up to date
 swc_visit^0.3.00.5.10out of date
 termcolor^1.01.4.1up to date
 tracing^0.1.280.1.40up to date
 unicode-width^0.1.40.1.11up to date
 url^2.2.22.5.0up to date

Dev dependencies

(2 total, all up-to-date)

CrateRequiredLatestStatus
 rayon^11.10.0up to date
 serde_json^11.0.115up to date

Security Vulnerabilities

owning_ref: Multiple soundness issues in `owning_ref`

RUSTSEC-2022-0040

  • OwningRef::map_with_owner is unsound and may result in a use-after-free.
  • OwningRef::map is unsound and may result in a use-after-free.
  • OwningRefMut::as_owner and OwningRefMut::as_owner_mut are unsound and may result in a use-after-free.
  • The crate violates Rust's aliasing rules, which may cause miscompilations on recent compilers that emit the LLVM noalias attribute.

safer_owning_ref is a replacement crate which fixes these issues. No patched versions of the original crate are available, and the maintainer is unresponsive.