binjs_io: 'Read' on uninitialized memory may cause UB (#660)

* Report 0088-binjs_io to RustSec

* informational = "unsound"
This commit is contained in:
Youngsuk Kim
2021-08-21 21:20:15 -04:00
committed by GitHub
parent 9039912764
commit 9e4db05abc

View File

@@ -0,0 +1,19 @@
```toml
[advisory]
id = "RUSTSEC-0000-0000"
package = "binjs_io"
date = "2021-01-03"
url = "https://github.com/binast/binjs-ref/issues/460"
categories = ["memory-exposure"]
informational = "unsound"
[versions]
patched = []
```
# 'Read' on uninitialized memory may cause UB
Affected versions of this crate passes an uninitialized buffer to a user-provided `Read` implementation. The crate currently contains 4 occurrences of such cases.
Arbitrary `Read` implementations can read from the uninitialized buffer (memory exposure) and also can return incorrect number of bytes written to the buffer.
Reading from uninitialized memory produces undefined values that can quickly invoke undefined behavior.