Vulnerability DatabaseRUSTSEC-2024-0334

RUSTSEC-2024-0334
Rust vulnerability analysis and mitigation

Overview

The RUSTSEC-2024-0334 vulnerability relates to the rust-libp2p-tokio-socks5 crate, which was marked as unmaintained on July 7, 2021. The crate provided TCP/IP transport protocol functionality via a SOCKS5 proxy for libp2p implementations. The last supported version was rust-libp2p v0.34 (GitHub Commit).

Technical details

The rust-libp2p-tokio-socks5 crate implemented the Transport trait from rust-libp2p, specifically designed to redirect traffic over a SOCKS5 proxy. The crate's last version was 0.8.0, released when it was marked as unmaintained (GitHub Commit).

Impact

Projects depending on rust-libp2p-tokio-socks5 for SOCKS5 proxy functionality in their libp2p implementations may face security risks and compatibility issues due to the lack of maintenance and updates. The crate does not receive security updates or compatibility fixes for newer versions of rust-libp2p beyond v0.34 (GitHub Commit).

Mitigation and workarounds

Users of this crate should migrate to alternative maintained SOCKS5 proxy implementations for rust-libp2p or consider taking over maintenance of the crate by contacting the original maintainer at me@tobin.cc (GitHub Commit).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
David EstlickCISO
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
Adam FletcherChief Security Officer
“We know that if Wiz identifies something as critical, it actually is.”
Greg PoniatowskiHead of Threat and Vulnerability Management