
Cloud Vulnerability DB
A community-led vulnerabilities database
The vulnerability (GHSA-72r2-rg28-47v9) affects the bite crate in Rust, specifically versions 0.0.5 and earlier. The issue was discovered on December 31, 2020, and was published to the GitHub Advisory Database on June 16, 2022. The vulnerability involves the bite::read::BiteReadExpandedExt::readframedmax method, which creates and uses an uninitialized buffer in an unsafe manner (GitHub Advisory, RustSec Advisory).
The vulnerability exists in the readframedmax method where it creates an uninitialized buffer and passes it to a user-provided Read implementation. According to the Read trait documentation, it is the responsibility of the implementer to ensure that the buffer is initialized before calling read. Using an uninitialized buffer (obtained via MaybeUninit) is not safe and can lead to undefined behavior in Rust (GitHub Issue).
This vulnerability is classified as High severity and can lead to memory-safety and soundness issues in Rust applications using the affected versions of the bite crate. The issue potentially exposes applications to undefined behavior when reading from uninitialized memory (GitHub Advisory, RustSec Advisory).
Currently, there are no patched versions available for this vulnerability. Users of the bite crate versions 0.0.5 and earlier should be aware of this security issue and consider alternative implementations that properly initialize buffers before reading (GitHub Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."