This project might be open to known security vulnerabilities, which can be prevented by tightening the version range of affected dependencies. Find detailed information at the bottom.

Crate example-runner-cpu

Dependencies

(2 total, all up-to-date)

CrateRequiredLatestStatus
 minifb^0.19.20.19.3up to date
 rayon^1.51.5.1up to date

Crate example-runner-ash

Dependencies

(7 total, 1 outdated, 1 possibly insecure)

CrateRequiredLatestStatus
 ash ⚠️^0.330.33.3+1.2.191maybe insecure
 ash-window^0.70.7.0up to date
 serde^1.01.0.130up to date
 serde_json^1.01.0.68up to date
 structopt^0.3.200.3.25up to date
 cfg-if^1.0.01.0.0up to date
 nix^0.20.20.23.0out of date

Crate example-runner-wgpu

Dependencies

(6 total, all up-to-date)

CrateRequiredLatestStatus
 cfg-if^1.0.01.0.0up to date
 futures^0.30.3.17up to date
 wgpu^0.110.11.0up to date
 structopt^0.30.3.25up to date
 strum^0.22.00.22.0up to date
 bytemuck^1.6.31.7.2up to date

Crate example-runner-wgpu-builder

No external dependencies! 🙌

Crate sky-shader

No external dependencies! 🙌

Crate simplest-shader

No external dependencies! 🙌

Crate compute-shader

No external dependencies! 🙌

Crate mouse-shader

No external dependencies! 🙌

Crate multibuilder

No external dependencies! 🙌

Crate rustc_codegen_spirv

Dependencies

(15 total, all up-to-date)

CrateRequiredLatestStatus
 hashbrown^0.110.11.2up to date
 libc^0.20.2.104up to date
 num-traits^0.20.2.14up to date
 syn^11.0.80up to date
 ar^0.9.00.9.0up to date
 bimap^0.60.6.1up to date
 indexmap^1.6.01.7.0up to date
 rspirv^0.100.10.0+1.5.4up to date
 rustc-demangle^0.1.210.1.21up to date
 sanitize-filename^0.30.3.0up to date
 serde^1.01.0.130up to date
 serde_json^1.01.0.68up to date
 smallvec^1.6.11.7.0up to date
 spirv-tools^0.70.7.1up to date
 topological-sort^0.10.1.0up to date

Dev dependencies

(3 total, all up-to-date)

CrateRequiredLatestStatus
 pipe^0.40.4.0up to date
 pretty_assertions^1.01.0.0up to date
 tempfile^3.23.2.0up to date

Crate spirv-builder

Dependencies

(5 total, all up-to-date)

CrateRequiredLatestStatus
 memchr^2.42.4.1up to date
 raw-string^0.3.50.3.5up to date
 serde^1.01.0.130up to date
 serde_json^1.01.0.68up to date
 notify^5.0.0-pre.114.0.17up to date

Crate spirv-std

Dependencies

(3 total, all up-to-date)

CrateRequiredLatestStatus
 bitflags^1.2.11.3.2up to date
 num-traits^0.2.140.2.14up to date
 glam>=0.17, <=0.190.19.0up to date

Crate spirv-types

No external dependencies! 🙌

Crate spirv-std-macros

Dependencies

(4 total, all up-to-date)

CrateRequiredLatestStatus
 heck^0.3.20.3.3up to date
 proc-macro2^1.0.241.0.30up to date
 quote^1.0.81.0.10up to date
 syn^1.0.581.0.80up to date

Crate compiletests

Dependencies

(2 total, all up-to-date)

CrateRequiredLatestStatus
 compiletest_rs^0.7.00.7.0up to date
 structopt^0.3.210.3.25up to date

Crate compiletests-deps-helper

No external dependencies! 🙌

Crate shared

Dependencies

(1 total, all up-to-date)

CrateRequiredLatestStatus
 bytemuck^1.6.31.7.2up to date

Security Vulnerabilities

ash: Reading on uninitialized memory may cause UB ( `util::read_spv()` )

RUSTSEC-2021-0090

Affected versions of this crate passes an uninitialized buffer to a user-provided Read implementation.

Arbitrary Read implementations can read from the uninitialized buffer (memory exposure) and also can return incorrect number of bytes written to the buffer. Reading from uninitialized memory produces undefined values that can quickly invoke undefined behavior.