From 460ac8be0db4e17f517287b16a024dec0ba617e9 Mon Sep 17 00:00:00 2001 From: Ammar Askar Date: Sat, 21 Aug 2021 21:39:40 -0400 Subject: [PATCH] Add advisory for uninitialized exposure in messagepack-rs (#835) --- crates/messagepack-rs/RUSTSEC-0000-0000.md | 25 ++++++++++++++++++++++ 1 file changed, 25 insertions(+) create mode 100644 crates/messagepack-rs/RUSTSEC-0000-0000.md diff --git a/crates/messagepack-rs/RUSTSEC-0000-0000.md b/crates/messagepack-rs/RUSTSEC-0000-0000.md new file mode 100644 index 0000000..104700d --- /dev/null +++ b/crates/messagepack-rs/RUSTSEC-0000-0000.md @@ -0,0 +1,25 @@ +```toml +[advisory] +id = "RUSTSEC-0000-0000" +package = "messagepack-rs" +date = "2021-01-26" +url = "https://github.com/otake84/messagepack-rs/issues/2" +categories = ["memory-exposure"] + +[versions] +patched = [] +``` + +# Deserialization functions pass uninitialized memory to user-provided Read + +Affected versions of this crate passed an uninitialized buffer to a +user-provided `Read` instance in: + +* `deserialize_binary` +* `deserialize_string` +* `deserialize_extension_others` +* `deserialize_string_primitive` + +This can result in safe `Read` implementations reading from the uninitialized +buffer leading to undefined behavior. +