When this function was passed an empty string, openssl
would attempt to call strlen
on it, reading arbitrary memory until it reached a NUL byte.
enclave-runner 0.1.0
This project might be open to known security vulnerabilities, which can be prevented by tightening the version range of affected dependencies. Find detailed information at the bottom.
enclave-runner
(10 total, 4 outdated, 1 possibly insecure)
Crate | Required | Latest | Status |
---|---|---|---|
failure | ^0.1.1 | 0.1.8 | up to date |
failure_derive | ^0.1.1 | 0.1.8 | up to date |
fnv | ^1 | 1.0.7 | up to date |
fortanix-sgx-abi | ^0.3.0 | 0.5.0 | out of date |
lazy_static | ^1.2.0 | 1.4.0 | up to date |
libc | ^0.2.48 | 0.2.154 | up to date |
nix | ^0.13.0 | 0.28.0 | out of date |
openssl ⚠️ | ^0.10 | 0.10.64 | maybe insecure |
sgx-isa | ^0.2.0 | 0.4.1 | out of date |
sgxs | ^0.6.0 | 0.8.0 | out of date |
openssl
: `openssl` `X509VerifyParamRef::set_host` buffer over-readWhen this function was passed an empty string, openssl
would attempt to call strlen
on it, reading arbitrary memory until it reached a NUL byte.