RUSTSEC-2020-0155
(unsound)
on 2020-12-27:
Read
on uninitialized buffer in fill_buf()
and read_up_to()
Read
on uninitialized buffer in fill_buf()
and read_up_to()
This crate has no reviews yet. To add a review, set up your cargo-crev
.
Crates in the crates.io registry are tarball snapshots uploaded by crates' publishers. The registry is not using crates' git repositories. There is absolutely no guarantee that the repository URL declared by the crate belongs to the crate, or that the code in the repository is the code inside the published tarball.
To review the actual code of the crate, it's best to use cargo crev open acc_reader
. Alternatively, you can download the tarball of acc_reader v2.0.0 or view the source online.
Affected versions of this crate passes an uninitialized buffer to a user-provided
Read
implementation.Arbitrary
Read
implementations can read from the uninitialized buffer (memory exposure) and also can return incorrect number of bytes written to the buffer. Reading from uninitialized memory produces undefined values that can quickly invoke undefined behavior.CVE-2020-36513
CVE-2020-36514
GHSA-799f-r78p-gq9c
GHSA-hv9v-7w3v-rj6f
GHSA-p4cr-64x4-f92f