diff --git a/crates/acc_reader/RUSTSEC-0000-0000.md b/crates/acc_reader/RUSTSEC-0000-0000.md new file mode 100644 index 0000000..d55b896 --- /dev/null +++ b/crates/acc_reader/RUSTSEC-0000-0000.md @@ -0,0 +1,19 @@ +```toml +[advisory] +id = "RUSTSEC-0000-0000" +package = "acc_reader" +date = "2020-12-27" +url = "https://github.com/netvl/acc_reader/issues/1" +categories = ["memory-exposure"] +informational = "unsound" + +[versions] +patched = [] +``` + +# `Read` on uninitialized buffer in `fill_buf()` and `read_up_to()` + +Affected versions of this crate passes an uninitialized buffer to a user-provided `Read` implementation. + +Arbitrary `Read` implementations can read from the uninitialized buffer (memory exposure) and also can return incorrect number of bytes written to the buffer. +Reading from uninitialized memory produces undefined values that can quickly invoke undefined behavior.