Affected version of this crate did not properly parse unknown fields when parsing a user-supplied input.
This allows an attacker to cause a stack overflow when parsing the mssage on untrusted data.
rust_cast 0.14.0
This project might be open to known security vulnerabilities, which can be prevented by tightening the version range of affected dependencies. Find detailed information at the bottom.
rust_cast
(7 total, 1 outdated, 2 possibly insecure)
Crate | Required | Latest | Status |
---|---|---|---|
byteorder | ^1.2.6 | 1.5.0 | up to date |
log | ^0.4.5 | 0.4.27 | up to date |
openssl ⚠️ | ^0.10.13 | 0.10.73 | maybe insecure |
protobuf ⚠️ | ^2.1.1 | 3.7.2 | out of date |
serde | ^1.0.80 | 1.0.219 | up to date |
serde_derive | ^1.0.80 | 1.0.219 | up to date |
serde_json | ^1.0.32 | 1.0.140 | up to date |
protobuf
: Crash due to uncontrolled recursion in protobuf crateAffected version of this crate did not properly parse unknown fields when parsing a user-supplied input.
This allows an attacker to cause a stack overflow when parsing the mssage on untrusted data.
openssl
: Use-After-Free in `Md::fetch` and `Cipher::fetch`When a Some(...)
value was passed to the properties
argument of either of these functions, a use-after-free would result.
In practice this would nearly always result in OpenSSL treating the properties as an empty string (due to CString::drop
's behavior).
The maintainers thank quitbug for reporting this vulnerability to us.