-
CVSS Score
-| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| acc_reader | rust | <= 2.0.0 |
Both functions exhibit the same core vulnerability pattern: 1) Using Vec::set_len to expand buffer capacity without initializing memory 2) Passing the resulting uninitialized buffer slice to Read::read 3) Violating the Read trait's requirement that buffers must be initialized before reading. The code examples from lib.rs show direct unsafe buffer manipulation through set_len followed by passing the uninitialized &mut [u8] to user-controlled Read implementations, which matches the vulnerability description of memory exposure through uninitialized buffers.