When this function was passed an empty string, openssl
would attempt to call strlen
on it, reading arbitrary memory until it reached a NUL byte.
actix-tls 3.0.1
This project might be open to known security vulnerabilities, which can be prevented by tightening the version range of affected dependencies. Find detailed information at the bottom.
actix-tls
(15 total, 5 outdated, 1 possibly insecure)
Crate | Required | Latest | Status |
---|---|---|---|
actix-codec | ^0.4.2 | 0.5.2 | out of date |
actix-rt | ^2.2.0 | 2.9.0 | up to date |
actix-service | ^2.0.0 | 2.0.2 | up to date |
actix-utils | ^3.0.0 | 3.0.1 | up to date |
derive_more | ^0.99.5 | 0.99.17 | up to date |
futures-core | ^0.3.7 | 0.3.30 | up to date |
http | ^0.2.3 | 1.1.0 | out of date |
log | ^0.4 | 0.4.21 | up to date |
pin-project-lite | ^0.2.7 | 0.2.14 | up to date |
openssl ⚠️ | ^0.10.9 | 0.10.64 | maybe insecure |
tokio-native-tls | ^0.3 | 0.3.1 | up to date |
tokio-openssl | ^0.6 | 0.6.4 | up to date |
tokio-rustls | ^0.23 | 0.26.0 | out of date |
tokio-util | ^0.6.3 | 0.7.10 | out of date |
webpki-roots | ^0.22 | 0.26.1 | out of date |
openssl
: `openssl` `X509VerifyParamRef::set_host` buffer over-readWhen this function was passed an empty string, openssl
would attempt to call strlen
on it, reading arbitrary memory until it reached a NUL byte.