OpenSSL has a modified
bit that it can set on on X509_NAME
objects. If this
bit is set then the object is not thread-safe even when it appears the code is
not modifying the value.
Thanks to David Benjamin (Google) for reporting this issue.
trust-dns-proto 0.2.0
This project might be open to known security vulnerabilities, which can be prevented by tightening the version range of affected dependencies. Find detailed information at the bottom.
trust-dns-proto
(11 total, 8 outdated, 1 possibly insecure)
Crate | Required | Latest | Status |
---|---|---|---|
data-encoding | ^2.1.0 | 2.6.0 | up to date |
error-chain | ^0.1.12 | 0.12.4 | out of date |
futures | ^0.1.17 | 0.3.30 | out of date |
log | ^0.3.5 | 0.4.21 | out of date |
openssl ⚠️ | ^0.9.8 | 0.10.64 | out of date |
rand | ^0.3 | 0.8.5 | out of date |
ring | ^0.12 | 0.17.8 | out of date |
tokio-core | ^0.1 | 0.1.18 | up to date |
tokio-io | ^0.1 | 0.1.13 | up to date |
untrusted | ^0.5 | 0.9.0 | out of date |
url | ^1.6.0 | 2.5.0 | out of date |
openssl
: `openssl` `X509NameBuilder::build` returned object is not thread safeOpenSSL has a modified
bit that it can set on on X509_NAME
objects. If this
bit is set then the object is not thread-safe even when it appears the code is
not modifying the value.
Thanks to David Benjamin (Google) for reporting this issue.
openssl
: `openssl` `SubjectAlternativeName` and `ExtendedKeyUsage::other` allow arbitrary file readSubjectAlternativeName
and ExtendedKeyUsage
arguments were parsed using the OpenSSL
function X509V3_EXT_nconf
. This function parses all input using an OpenSSL mini-language
which can perform arbitrary file reads.
Thanks to David Benjamin (Google) for reporting this issue.
openssl
: `openssl` `X509Extension::new` and `X509Extension::new_nid` null pointer dereferenceThese functions would crash when the context argument was None with certain extension types.
Thanks to David Benjamin (Google) for reporting this issue.
openssl
: `openssl` `X509VerifyParamRef::set_host` buffer over-readWhen this function was passed an empty string, openssl
would attempt to call strlen
on it, reading arbitrary memory until it reached a NUL byte.