Previously, MemBio::get_buf
called slice::from_raw_parts
with a null-pointer, which violates the functions invariants, leading to undefined behavior. In debug builds this would produce an assertion failure. This is now fixed.
etcd-client 0.14.0
This project might be open to known security vulnerabilities, which can be prevented by tightening the version range of affected dependencies. Find detailed information at the bottom.
etcd-client
(12 total, 1 outdated, 2 possibly insecure)
Crate | Required | Latest | Status |
---|---|---|---|
http | ^1.1 | 1.1.0 | up to date |
hyper | ^1.4 | 1.5.0 | up to date |
hyper-openssl | ^0.10 | 0.10.2 | up to date |
hyper-util | ^0.1 | 0.1.10 | up to date |
openssl ⚠️ | ^0.10 | 0.10.68 | maybe insecure |
prost | ^0.13 | 0.13.3 | up to date |
tokio | ^1.38 | 1.41.1 | up to date |
tokio-stream | ^0.1 | 0.1.16 | up to date |
tonic ⚠️ | ^0.12 | 0.12.3 | maybe insecure |
tower | ^0.4 | 0.5.1 | out of date |
tower-service | ^0.3 | 0.3.3 | up to date |
visible | ^0.0.1 | 0.0.1 | up to date |
(1 total, all up-to-date)
Crate | Required | Latest | Status |
---|---|---|---|
tokio | ^1.38 | 1.41.1 | up to date |
openssl
: `MemBio::get_buf` has undefined behavior with empty buffersPreviously, MemBio::get_buf
called slice::from_raw_parts
with a null-pointer, which violates the functions invariants, leading to undefined behavior. In debug builds this would produce an assertion failure. This is now fixed.
tonic
: Remotely exploitable Denial of Service in TonicWhen using tonic::transport::Server
there is a remote DoS attack that can cause the server to exit cleanly on accepting a tcp/tls stream. This can be triggered via causing the accept call to error out with errors there were not covered correctly causing the accept loop to exit.
More information can be found here
Upgrading to tonic 0.12.3
and above contains the fix.
A custom accept loop is a possible workaround.