mirror of
https://github.com/OMGeeky/advisory-db.git
synced 2026-02-23 15:38:27 +01:00
Add advisory for buffered-reader (#1697)
Attacker-controlled input can lead to an out-of-bounds index, which causes buffered-reader to panic. This has been fixed in versions 1.2.0, 1.1.5, and 1.0.2 of buffered-reader.
This commit is contained in:
24
crates/buffered-reader/RUSTSEC-0000-0000.md
Normal file
24
crates/buffered-reader/RUSTSEC-0000-0000.md
Normal file
@@ -0,0 +1,24 @@
|
|||||||
|
```toml
|
||||||
|
[advisory]
|
||||||
|
id = "RUSTSEC-0000-0000"
|
||||||
|
package = "buffered-reader"
|
||||||
|
date = "2023-05-16"
|
||||||
|
url = "https://lists.sequoia-pgp.org/hyperkitty/list/announce@lists.sequoia-pgp.org/thread/SN2E3QRT4DMQ5JNEK6VIN6DJ5SH766DI/"
|
||||||
|
references = ["https://gitlab.com/sequoia-pgp/sequoia/-/tags/buffered-reader%2Fv1.2.0"]
|
||||||
|
categories = ["denial-of-service"]
|
||||||
|
# Attacker-controlled input can result in a panic due to an
|
||||||
|
# out-of-bounds array index.
|
||||||
|
keywords = ["panic"]
|
||||||
|
|
||||||
|
[versions]
|
||||||
|
patched = [">= 1.0.2, < 1.1.0", ">= 1.1.5, < 1.2.0", ">= 1.2.0"]
|
||||||
|
```
|
||||||
|
|
||||||
|
# Out-of-bounds array access leads to panic
|
||||||
|
|
||||||
|
Affected versions of the crate have a bug where attacker-controlled
|
||||||
|
input can result in the use of an out-of-bound array index. Rust
|
||||||
|
detects the use of the out-of-bound index and causes the application
|
||||||
|
to panic. An attacker may be able to use this to cause a
|
||||||
|
denial-of-service. However, it is not possible for an attacker to
|
||||||
|
read from or write to the application's address space.
|
||||||
Reference in New Issue
Block a user