mirror of
https://github.com/OMGeeky/advisory-db.git
synced 2026-01-05 19:20:34 +01:00
binjs_io: 'Read' on uninitialized memory may cause UB (#660)
* Report 0088-binjs_io to RustSec * informational = "unsound"
This commit is contained in:
19
crates/binjs_io/RUSTSEC-0000-0000.md
Normal file
19
crates/binjs_io/RUSTSEC-0000-0000.md
Normal file
@@ -0,0 +1,19 @@
|
||||
```toml
|
||||
[advisory]
|
||||
id = "RUSTSEC-0000-0000"
|
||||
package = "binjs_io"
|
||||
date = "2021-01-03"
|
||||
url = "https://github.com/binast/binjs-ref/issues/460"
|
||||
categories = ["memory-exposure"]
|
||||
informational = "unsound"
|
||||
|
||||
[versions]
|
||||
patched = []
|
||||
```
|
||||
|
||||
# 'Read' on uninitialized memory may cause UB
|
||||
|
||||
Affected versions of this crate passes an uninitialized buffer to a user-provided `Read` implementation. The crate currently contains 4 occurrences of such cases.
|
||||
|
||||
Arbitrary `Read` implementations can read from the uninitialized buffer (memory exposure) and also can return incorrect number of bytes written to the buffer.
|
||||
Reading from uninitialized memory produces undefined values that can quickly invoke undefined behavior.
|
||||
Reference in New Issue
Block a user