When this function was passed an empty string, openssl
would attempt to call strlen
on it, reading arbitrary memory until it reached a NUL byte.
smpl_jwt 0.8.0
This project might be open to known security vulnerabilities, which can be prevented by tightening the version range of affected dependencies. Find detailed information at the bottom.
smpl_jwt
(8 total, 1 outdated, 1 possibly insecure)
Crate | Required | Latest | Status |
---|---|---|---|
base64 | ^0.21 | 0.22.1 | out of date |
log | ^0.4 | 0.4.21 | up to date |
openssl ⚠️ | ^0.10 | 0.10.64 | maybe insecure |
serde | ^1.0 | 1.0.200 | up to date |
serde_derive | ^1.0 | 1.0.200 | up to date |
serde_json | ^1.0 | 1.0.116 | up to date |
simpl | ^0.1 | 0.1.0 | up to date |
time | ^0.3.9 | 0.3.36 | up to date |
openssl
: `openssl` `X509VerifyParamRef::set_host` buffer over-readWhen this function was passed an empty string, openssl
would attempt to call strlen
on it, reading arbitrary memory until it reached a NUL byte.