Skip to content

Commit

Permalink
binjs_io: 'Read' on uninitialized memory may cause UB (#660)
Browse files Browse the repository at this point in the history
* Report 0088-binjs_io to RustSec

* informational = "unsound"
  • Loading branch information
JOE1994 authored Aug 22, 2021
1 parent 9039912 commit 9e4db05
Showing 1 changed file with 19 additions and 0 deletions.
19 changes: 19 additions & 0 deletions crates/binjs_io/RUSTSEC-0000-0000.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,19 @@
```toml
[advisory]
id = "RUSTSEC-0000-0000"
package = "binjs_io"
date = "2021-01-03"
url = "https://github.com/binast/binjs-ref/issues/460"
categories = ["memory-exposure"]
informational = "unsound"

[versions]
patched = []
```

# 'Read' on uninitialized memory may cause UB

Affected versions of this crate passes an uninitialized buffer to a user-provided `Read` implementation. The crate currently contains 4 occurrences of such cases.

Arbitrary `Read` implementations can read from the uninitialized buffer (memory exposure) and also can return incorrect number of bytes written to the buffer.
Reading from uninitialized memory produces undefined values that can quickly invoke undefined behavior.

0 comments on commit 9e4db05

Please sign in to comment.