{"id":"RUSTSEC-2021-0051","summary":"KeyValueReader passes uninitialized memory to Read instance","details":"The `KeyValueReader` type in affected versions of this crate set up an\nuninitialized memory buffer and passed them to be read in to a user-provided\n`Read` instance.\n\nThe `Read` instance could read uninitialized memory and cause undefined\nbehavior and miscompilations.\n\nThis issue was fixed in commit [dd59b30](https://github.com/SolraBizna/outer_cgi/commit/dd59b3066e616a08e756f72de8dc3ab11b7036c4)\nby zero-initializing the buffers before passing them.","aliases":["CVE-2021-30454","GHSA-6vmq-jh76-hq43"],"modified":"2023-11-08T04:05:46.033472Z","published":"2021-01-31T12:00:00Z","database_specific":{"license":"CC0-1.0"},"references":[{"type":"PACKAGE","url":"https://crates.io/crates/outer_cgi"},{"type":"ADVISORY","url":"https://rustsec.org/advisories/RUSTSEC-2021-0051.html"},{"type":"REPORT","url":"https://github.com/SolraBizna/outer_cgi/issues/1"}],"affected":[{"package":{"name":"outer_cgi","ecosystem":"crates.io","purl":"pkg:cargo/outer_cgi"},"ranges":[{"type":"SEMVER","events":[{"introduced":"0.0.0-0"},{"fixed":"0.2.1"}]}],"ecosystem_specific":{"affects":{"functions":[],"arch":[],"os":[]},"affected_functions":null},"database_specific":{"categories":["memory-exposure"],"informational":null,"cvss":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","source":"https://github.com/rustsec/advisory-db/blob/osv/crates/RUSTSEC-2021-0051.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}