When this function was passed an empty string, openssl
would attempt to call strlen
on it, reading arbitrary memory until it reached a NUL byte.
tcp-stream 0.6.0
This project might be open to known security vulnerabilities, which can be prevented by tightening the version range of affected dependencies. Find detailed information at the bottom.
tcp-stream
(7 total, 4 outdated, 1 possibly insecure)
Crate | Required | Latest | Status |
---|---|---|---|
cfg-if | ^0.1.5 | 1.0.0 | out of date |
futures | ^0.1 | 0.3.30 | out of date |
mio | ^0.6.14 | 0.8.11 | out of date |
native-tls | ^0.2 | 0.2.11 | up to date |
openssl ⚠️ | ^0.10 | 0.10.64 | maybe insecure |
rustls-connector | ^0.8 | 0.21.0 | out of date |
tokio-io | ^0.1.7 | 0.1.13 | up to date |
openssl
: `openssl` `X509VerifyParamRef::set_host` buffer over-readWhen this function was passed an empty string, openssl
would attempt to call strlen
on it, reading arbitrary memory until it reached a NUL byte.