rustsec-2021-0032
Vulnerability from osv_rustsec
Published
2021-03-01 12:00
Modified
2023-06-13 13:10
Summary
Deserializing an array can drop uninitialized memory on panic
Details
The read_bytes_default_le function for [T; n] arrays, used to deserialize
arrays of T from bytes created a [T; n] array with std::mem::uninitialized
and then called T's deserialization method.
If T's deserialization method panicked, the uninitialized memory could drop
invalid objects.
This flaw was corrected in a535678 by removing the unsafe block and using
a .map function to deserialize each element of the array instead.
{
"affected": [
{
"database_specific": {
"categories": [
"memory-corruption"
],
"cvss": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"informational": null
},
"ecosystem_specific": {
"affected_functions": null,
"affects": {
"arch": [],
"functions": [],
"os": []
}
},
"package": {
"ecosystem": "crates.io",
"name": "byte_struct",
"purl": "pkg:cargo/byte_struct"
},
"ranges": [
{
"events": [
{
"introduced": "0.0.0-0"
},
{
"fixed": "0.6.1"
}
],
"type": "SEMVER"
}
],
"versions": []
}
],
"aliases": [
"CVE-2021-28033",
"GHSA-8fgg-5v78-6g76"
],
"database_specific": {
"license": "CC0-1.0"
},
"details": "The `read_bytes_default_le` function for `[T; n]` arrays, used to deserialize\narrays of `T` from bytes created a `[T; n]` array with `std::mem::uninitialized`\nand then called `T`\u0027s deserialization method.\n\nIf `T`\u0027s deserialization method panicked, the uninitialized memory could drop\ninvalid objects.\n\nThis flaw was corrected in `a535678` by removing the unsafe block and using\na `.map` function to deserialize each element of the array instead.",
"id": "RUSTSEC-2021-0032",
"modified": "2023-06-13T13:10:24Z",
"published": "2021-03-01T12:00:00Z",
"references": [
{
"type": "PACKAGE",
"url": "https://crates.io/crates/byte_struct"
},
{
"type": "ADVISORY",
"url": "https://rustsec.org/advisories/RUSTSEC-2021-0032.html"
},
{
"type": "REPORT",
"url": "https://github.com/wwylele/byte-struct-rs/issues/1"
}
],
"related": [],
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
],
"summary": "Deserializing an array can drop uninitialized memory on panic"
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…