From a24932e220dfa9be8b0b501210fef8a0bc7ef43e Mon Sep 17 00:00:00 2001 From: Yechan Bae Date: Mon, 7 Dec 2020 10:31:37 -0500 Subject: [PATCH] Update example advisory text (#513) --- EXAMPLE_ADVISORY.md | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) diff --git a/EXAMPLE_ADVISORY.md b/EXAMPLE_ADVISORY.md index 710dea8..8d11c29 100644 --- a/EXAMPLE_ADVISORY.md +++ b/EXAMPLE_ADVISORY.md @@ -34,8 +34,8 @@ of the vulnerability, will be converted into HTML and rendered at A well structured advisory will include information like: -Affected versions of this crate did not properly X. +Affected versions of this crate did not properly check for integer overflow when allocating a buffer in `MyBuffer::with_capacity()` (bug description/location/root cause). -This allows an attacker to Y. - -The flaw was corrected by Z. +This can result in a memory corruption (consequence of the bug) when large integer is given to the parameter (trigger condition). + +The flaw was corrected in commit abc123 by using `saturating_mul()` when calculating the buffer size (fix description).