When this function was passed an empty string, openssl
would attempt to call strlen
on it, reading arbitrary memory until it reached a NUL byte.
trust-dns-util 0.19.2
This project might be open to known security vulnerabilities, which can be prevented by tightening the version range of affected dependencies. Find detailed information at the bottom.
trust-dns-util
(8 total, 5 outdated, 1 possibly insecure)
Crate | Required | Latest | Status |
---|---|---|---|
clap | ^2.33.0 | 4.5.4 | out of date |
data-encoding | ^2.1.0 | 2.5.0 | up to date |
env_logger | ^0.7 | 0.11.3 | out of date |
log | ^0.4 | 0.4.21 | up to date |
openssl ⚠️ | ^0.10 | 0.10.64 | maybe insecure |
trust-dns-client | ^0.19.2 | 0.23.2 | out of date |
trust-dns-proto | ^0.19.2 | 0.23.2 | out of date |
trust-dns-resolver | ^0.19.2 | 0.23.2 | out of date |
openssl
: `openssl` `X509VerifyParamRef::set_host` buffer over-readWhen this function was passed an empty string, openssl
would attempt to call strlen
on it, reading arbitrary memory until it reached a NUL byte.