RUSTSEC-2021-0091
(unsound)
on 2021-01-07: Reading on uninitialized buffer may cause UB (
gfx_auxil::read_spirv()
)
gfx_auxil::read_spirv()
)
This crate has no reviews yet. To add a review, set up your cargo-crev
.
Lib.rs has been able to verify that all files in the crate's tarball are in the crate's repository. Please note that this check is still in beta, and absence of this confirmation does not mean that the files don't match.
Crates in the crates.io registry are tarball snapshots uploaded by crates' publishers. The registry is not using crates' git repositories, so there is a possibility that published crates have a misleading repository URL, or contain different code from the code in the repository.
To review the actual code of the crate, it's best to use cargo crev open gfx-auxil
. Alternatively, you can download the tarball of gfx-auxil v0.10.0 or view the source online.
Affected versions of this crate passes an uninitialized buffer to a user-provided
Read
implementation.Arbitrary
Read
implementations can read from the uninitialized buffer (memory exposure) and also can return incorrect number of bytes written to the buffer. Reading from uninitialized memory produces undefined values that can quickly invoke undefined behavior.CVE-2021-45689
GHSA-28p5-7rg4-8v99
GHSA-ff2r-xpwq-6whj