From 8a7fc61c92533151fa9a26c971eb51b0d59e3647 Mon Sep 17 00:00:00 2001 From: "Neal H. Walfield" Date: Wed, 31 May 2023 23:02:26 +0200 Subject: [PATCH] Add advisory for buffered-reader (#1697) Attacker-controlled input can lead to an out-of-bounds index, which causes buffered-reader to panic. This has been fixed in versions 1.2.0, 1.1.5, and 1.0.2 of buffered-reader. --- crates/buffered-reader/RUSTSEC-0000-0000.md | 24 +++++++++++++++++++++ 1 file changed, 24 insertions(+) create mode 100644 crates/buffered-reader/RUSTSEC-0000-0000.md diff --git a/crates/buffered-reader/RUSTSEC-0000-0000.md b/crates/buffered-reader/RUSTSEC-0000-0000.md new file mode 100644 index 000000000..427ff078e --- /dev/null +++ b/crates/buffered-reader/RUSTSEC-0000-0000.md @@ -0,0 +1,24 @@ +```toml +[advisory] +id = "RUSTSEC-0000-0000" +package = "buffered-reader" +date = "2023-05-16" +url = "https://lists.sequoia-pgp.org/hyperkitty/list/announce@lists.sequoia-pgp.org/thread/SN2E3QRT4DMQ5JNEK6VIN6DJ5SH766DI/" +references = ["https://gitlab.com/sequoia-pgp/sequoia/-/tags/buffered-reader%2Fv1.2.0"] +categories = ["denial-of-service"] +# Attacker-controlled input can result in a panic due to an +# out-of-bounds array index. +keywords = ["panic"] + +[versions] +patched = [">= 1.0.2, < 1.1.0", ">= 1.1.5, < 1.2.0", ">= 1.2.0"] +``` + +# Out-of-bounds array access leads to panic + +Affected versions of the crate have a bug where attacker-controlled +input can result in the use of an out-of-bound array index. Rust +detects the use of the out-of-bound index and causes the application +to panic. An attacker may be able to use this to cause a +denial-of-service. However, it is not possible for an attacker to +read from or write to the application's address space.