diff --git a/crates/cve-rs/RUSTSEC-0000-0000.md b/crates/cve-rs/RUSTSEC-0000-0000.md new file mode 100644 index 00000000..2cf786b6 --- /dev/null +++ b/crates/cve-rs/RUSTSEC-0000-0000.md @@ -0,0 +1,20 @@ +```toml +[advisory] +id = "RUSTSEC-0000-0000" +package = "cve-rs" +date = "2025-02-10" +url = "https://github.com/Speykious/cve-rs" +categories = ["memory-corruption"] +informational = "unsound" +keywords = ["soundness-hole"] + +[versions] +patched = [] +unaffected = [] +``` + +# cve-rs introduces memory vulnerabilities in safe Rust + +`cve-rs` allows you to introduce common memory vulnerabilities (such as buffer overflows and segfaults) into your Rust program in a memory safe manner. + +Internally, this crate does not use unsafe code, it instead exploits a soundness bug in rustc: https://github.com/rust-lang/rust/issues/25860 diff --git a/crates/totally-safe-transmute/RUSTSEC-0000-0000.md b/crates/totally-safe-transmute/RUSTSEC-0000-0000.md new file mode 100644 index 00000000..73e3f468 --- /dev/null +++ b/crates/totally-safe-transmute/RUSTSEC-0000-0000.md @@ -0,0 +1,20 @@ +```toml +[advisory] +id = "RUSTSEC-0000-0000" +package = "totally-safe-transmute" +date = "2025-02-10" +url = "https://github.com/ben0x539/totally-safe-transmute" +categories = ["memory-corruption"] +informational = "unsound" +keywords = ["soundness-hole"] + +[versions] +patched = [] +unaffected = [] +``` + +# totally-safe-transmute allows transmuting any type to any other type in safe Rust + +This crate uses a known soundness issue (https://github.com/rust-lang/rust/issues/32670) that will never get fixed. In short, Linux provides a file called `/proc/self/mem` which can be used by a program to modify its own memory. This library modifies an enum variant number by accessing its own memory as a file to effectively transmute a variable. + +See also diff --git a/crates/totally-safe/RUSTSEC-0000-0000.md b/crates/totally-safe/RUSTSEC-0000-0000.md new file mode 100644 index 00000000..4b964309 --- /dev/null +++ b/crates/totally-safe/RUSTSEC-0000-0000.md @@ -0,0 +1,18 @@ +```toml +[advisory] +id = "RUSTSEC-0000-0000" +package = "totally-safe" +date = "2025-02-10" +url = "https://github.com/viktorlott/totally-safe" +categories = ["memory-corruption"] +informational = "unsound" +keywords = ["soundness-hole"] + +[versions] +patched = [] +unaffected = [] +``` + +# totally-safe introduces memory vulnerabilities in safe Rust + +`totally-safe` provides unsound APIs that exploit a soundness bug in rustc: https://github.com/rust-lang/rust/issues/25860