An open API service providing security vulnerability metadata for many open source software ecosystems.

Security Advisories: GSA_kwCzR0hTQS01MmgyLW0yY2YtOWpoNs4AAwRz

linux-loader reading beyond EOF could lead to infinite loop


The linux-loader crate used the offsets and sizes provided in the ELF headers to determine the offsets to read from. If those offsets pointed beyond the end of the file this could lead to an infinite loop. Virtual Machine Monitors using the linux-loader crate could enter an infinite loop if the ELF header of the kernel they are loading was modified in a malicious manner.


The issue has been addressed in 0.8.1


The issue can be mitigated by ensuring that only trusted kernel images are loaded or by verifying that the headers to not point beyond the end of the file.



Source: GitHub Advisory Database
Origin: Unspecified
Severity: Low
Classification: General
Published: over 1 year ago
Updated: over 1 year ago

CVSS Score: 1.9
CVSS vector: CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L

Identifiers: GHSA-52h2-m2cf-9jh6, CVE-2022-23523
References: Repository:
Blast Radius: 4.2

Affected Packages

Dependent packages: 0
Dependent repositories: 166
Downloads: 1,479,778 total
Affected Version Ranges: < 0.8.1
Fixed in: 0.8.1
All affected versions: 0.1.0, 0.2.0, 0.3.0, 0.4.0, 0.5.0, 0.6.0, 0.7.0, 0.8.0
All unaffected versions: 0.8.1, 0.9.0, 0.9.1, 0.10.0, 0.11.0