diff --git a/crates/bra/RUSTSEC-0000-0000.md b/crates/bra/RUSTSEC-0000-0000.md new file mode 100644 index 0000000..230ee5b --- /dev/null +++ b/crates/bra/RUSTSEC-0000-0000.md @@ -0,0 +1,20 @@ +```toml +[advisory] +id = "RUSTSEC-0000-0000" +package = "bra" +date = "2021-01-02" +url = "https://github.com/Enet4/bra-rs/issues/1" +categories = ["memory-exposure"] + +[versions] +patched = [">= 0.1.1"] +``` + +# reading on uninitialized buffer can cause UB (`impl BufRead for GreedyAccessReader`) + +Affected versions of this crate creates an uninitialized buffer and passes it to user-provided `Read` implementation. + +This is unsound, because it allows safe Rust code to exhibit an undefined behavior (read from uninitialized memory). + +The flaw was corrected in version 0.1.1 by zero-initializing a newly allocated buffer +before handing it to a user-provided `Read` implementation.