Affected version of this crate did not properly parse unknown fields when parsing a user-supplied input.
This allows an attacker to cause a stack overflow when parsing the mssage on untrusted data.
This project might be open to known security vulnerabilities, which can be prevented by tightening the version range of affected dependencies. Find detailed information at the bottom.
rust_cast(7 total, 1 outdated, 2 possibly insecure)
| Crate | Required | Latest | Status |
|---|---|---|---|
| byteorder | ^1.2.6 | 1.5.0 | up to date |
| log | ^0.4.5 | 0.4.28 | up to date |
| openssl ⚠️ | ^0.10.13 | 0.10.74 | maybe insecure |
| protobuf ⚠️ | ^2.1.1 | 3.7.2 | out of date |
| serde | ^1.0.80 | 1.0.228 | up to date |
| serde_derive | ^1.0.80 | 1.0.228 | up to date |
| serde_json | ^1.0.32 | 1.0.145 | up to date |
protobuf: Crash due to uncontrolled recursion in protobuf crateAffected version of this crate did not properly parse unknown fields when parsing a user-supplied input.
This allows an attacker to cause a stack overflow when parsing the mssage on untrusted data.
openssl: Use-After-Free in `Md::fetch` and `Cipher::fetch`When a Some(...) value was passed to the properties argument of either of these functions, a use-after-free would result.
In practice this would nearly always result in OpenSSL treating the properties as an empty string (due to CString::drop's behavior).
The maintainers thank quitbug for reporting this vulnerability to us.