Advisory Database
  • Advisories
  • Dependency Scanning
  1. cargo
  2. ›
  3. buffered-reader
  4. ›
  5. CVE-2023-53161

CVE-2023-53161: buffered-reader vulnerable to out-of-bounds array access leading to panic

June 6, 2023 (updated July 28, 2025)

Affected versions of the crate have a bug where attacker-controlled input can result in the use of an out-of-bound array index. Rust detects the use of the out-of-bound index and causes the application to panic. An attacker may be able to use this to cause a denial-of-service. However, it is not possible for an attacker to read from or write to the application’s address space.

References

  • github.com/advisories/GHSA-25mx-8f3v-8wh7
  • github.com/advisories/GHSA-29mf-62xx-28jq
  • gitlab.com/sequoia-pgp/sequoia
  • gitlab.com/sequoia-pgp/sequoia/-/blob/main/buffered-reader/NEWS
  • gitlab.com/sequoia-pgp/sequoia/-/tags/buffered-reader%2Fv1.0.2
  • gitlab.com/sequoia-pgp/sequoia/-/tags/buffered-reader%2Fv1.1.5
  • lists.sequoia-pgp.org/hyperkitty/list/announce@lists.sequoia-pgp.org/thread/SN2E3QRT4DMQ5JNEK6VIN6DJ5SH766DI
  • nvd.nist.gov/vuln/detail/CVE-2023-53161
  • rustsec.org/advisories/RUSTSEC-2023-0039.html

Code Behaviors & Features

Detect and mitigate CVE-2023-53161 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 1.0.2, all versions starting from 1.1.0 before 1.1.5

Fixed versions

  • 1.0.2
  • 1.1.5

Solution

Upgrade to versions 1.0.2, 1.1.5 or above.

Impact 2.9 LOW

CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L

Learn more about CVSS

Source file

cargo/buffered-reader/CVE-2023-53161.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Tue, 19 Aug 2025 12:19:49 +0000.