When this function was passed an empty string, openssl
would attempt to call strlen
on it, reading arbitrary memory until it reached a NUL byte.
wasm-bindgen-cli 0.2.25
This project might be open to known security vulnerabilities, which can be prevented by tightening the version range of affected dependencies. Find detailed information at the bottom.
wasm-bindgen-cli
(13 total, 5 outdated, 1 possibly insecure)
Crate | Required | Latest | Status |
---|---|---|---|
curl | ^0.4.13 | 0.4.46 | up to date |
docopt | ^1.0 | 1.1.1 | up to date |
env_logger | ^0.5 | 0.11.3 | out of date |
failure | ^0.1.2 | 0.1.8 | up to date |
log | ^0.4 | 0.4.21 | up to date |
openssl ⚠️ | ^0.10.11 | 0.10.64 | maybe insecure |
parity-wasm | ^0.34 | 0.45.0 | out of date |
rouille | ^2.1.0 | 3.6.2 | out of date |
serde | ^1.0 | 1.0.198 | up to date |
serde_derive | ^1.0 | 1.0.198 | up to date |
serde_json | ^1.0 | 1.0.116 | up to date |
wasm-bindgen-cli-support | =0.2.25 | 0.2.92 | out of date |
wasm-bindgen-shared | =0.2.25 | 0.2.92 | out of date |
openssl
: `openssl` `X509VerifyParamRef::set_host` buffer over-readWhen this function was passed an empty string, openssl
would attempt to call strlen
on it, reading arbitrary memory until it reached a NUL byte.