When this function was passed an empty string, openssl
would attempt to call strlen
on it, reading arbitrary memory until it reached a NUL byte.
actix-test 0.1.1
This project might be open to known security vulnerabilities, which can be prevented by tightening the version range of affected dependencies. Find detailed information at the bottom.
actix-test
(17 total, 1 outdated, 2 possibly insecure)
Crate | Required | Latest | Status |
---|---|---|---|
actix-codec | ^0.5 | 0.5.2 | up to date |
actix-http | ^3 | 3.6.0 | up to date |
actix-http-test | ^3 | 3.2.0 | up to date |
actix-rt | ^2.1 | 2.9.0 | up to date |
actix-service | ^2 | 2.0.2 | up to date |
actix-utils | ^3 | 3.0.1 | up to date |
actix-web | ^4 | 4.5.1 | up to date |
awc | ^3 | 3.4.0 | up to date |
futures-core | ^0.3.17 | 0.3.30 | up to date |
futures-util | ^0.3.17 | 0.3.30 | up to date |
log | ^0.4 | 0.4.21 | up to date |
serde | ^1 | 1.0.198 | up to date |
serde_json | ^1 | 1.0.116 | up to date |
serde_urlencoded | ^0.7 | 0.7.1 | up to date |
openssl ⚠️ | ^0.10.9 | 0.10.64 | maybe insecure |
rustls ⚠️ | ^0.20.0 | 0.23.5 | out of date |
tokio | ^1.24.2 | 1.37.0 | up to date |
openssl
: `openssl` `X509VerifyParamRef::set_host` buffer over-readWhen this function was passed an empty string, openssl
would attempt to call strlen
on it, reading arbitrary memory until it reached a NUL byte.
rustls
: `rustls::ConnectionCommon::complete_io` could fall into an infinite loop based on network inputIf a close_notify
alert is received during a handshake, complete_io
does not terminate.
Callers which do not call complete_io
are not affected.
rustls-tokio
and rustls-ffi
do not call complete_io
and are not affected.
rustls::Stream
and rustls::StreamOwned
types use
complete_io
and are affected.