Commit 29d269e
committed
bump h2, mio, openssl to resolve cargo audit issues
Crate: h2
Version: 0.3.22
Title: Resource exhaustion vulnerability in h2 may lead to Denial of Service (DoS)
Date: 2024-01-17
ID: RUSTSEC-2024-0003
URL: https://rustsec.org/advisories/RUSTSEC-2024-0003
Solution: Upgrade to ^0.3.24 OR >=0.4.2
Crate: h2
Version: 0.3.22
Title: Degradation of service in h2 servers with CONTINUATION Flood
Date: 2024-04-03
ID: RUSTSEC-2024-0332
URL: https://rustsec.org/advisories/RUSTSEC-2024-0332
Solution: Upgrade to ^0.3.26 OR >=0.4.4
Crate: mio
Version: 0.8.6
Title: Tokens for named pipes may be delivered after deregistration
Date: 2024-03-04
ID: RUSTSEC-2024-0019
URL: https://rustsec.org/advisories/RUSTSEC-2024-0019
Solution: Upgrade to >=0.8.11
Crate: openssl
Version: 0.10.46
Title: `openssl` `X509NameBuilder::build` returned object is not thread safe
Date: 2023-03-24
ID: RUSTSEC-2023-0022
URL: https://rustsec.org/advisories/RUSTSEC-2023-0022
Solution: Upgrade to >=0.10.48
Crate: openssl
Version: 0.10.46
Title: `openssl` `SubjectAlternativeName` and `ExtendedKeyUsage::other` allow arbitrary file read
Date: 2023-03-24
ID: RUSTSEC-2023-0023
URL: https://rustsec.org/advisories/RUSTSEC-2023-0023
Solution: Upgrade to >=0.10.48
Crate: openssl
Version: 0.10.46
Title: `openssl` `X509Extension::new` and `X509Extension::new_nid` null pointer dereference
Date: 2023-03-24
ID: RUSTSEC-2023-0024
URL: https://rustsec.org/advisories/RUSTSEC-2023-0024
Solution: Upgrade to >=0.10.48
Crate: openssl
Version: 0.10.46
Title: `openssl` `X509VerifyParamRef::set_host` buffer over-read
Date: 2023-06-20
ID: RUSTSEC-2023-0044
URL: https://rustsec.org/advisories/RUSTSEC-2023-0044
Solution: Upgrade to >=0.10.551 parent f76d52c commit 29d269e
1 file changed
+104
-33
lines changedSome generated files are not rendered by default. Learn more about customizing how changed files appear on GitHub.
0 commit comments