When this function was passed an empty string, openssl
would attempt to call strlen
on it, reading arbitrary memory until it reached a NUL byte.
amadeus-commoncrawl 0.1.6
This project might be open to known security vulnerabilities, which can be prevented by tightening the version range of affected dependencies. Find detailed information at the bottom.
amadeus-commoncrawl
(10 total, 6 outdated, 1 possibly insecure)
Crate | Required | Latest | Status |
---|---|---|---|
amadeus-core | =0.1.6 | 0.4.3 | out of date |
amadeus-types | =0.1.6 | 0.4.3 | out of date |
flate2 | ^1.0 | 1.0.30 | up to date |
nom | ^4.2.3 | 7.1.3 | out of date |
openssl ⚠️ | ^0.10 | 0.10.64 | maybe insecure |
reqwest | ^0.9 | 0.12.4 | out of date |
reqwest_resume | ^0.2 | 0.3.2 | out of date |
serde | ^1.0 | 1.0.200 | up to date |
serde_closure | ^0.2 | 0.3.3 | out of date |
url | ^2.1 | 2.5.0 | up to date |
openssl
: `openssl` `X509VerifyParamRef::set_host` buffer over-readWhen this function was passed an empty string, openssl
would attempt to call strlen
on it, reading arbitrary memory until it reached a NUL byte.