Ecosyste.ms: Advisories

An open API service providing security vulnerability metadata for many open source software ecosystems.

Security Advisories: GSA_kwCzR0hTQS01MmgyLW0yY2YtOWpoNs4AAwRz

linux-loader reading beyond EOF could lead to infinite loop

Impact

The linux-loader crate used the offsets and sizes provided in the ELF headers to determine the offsets to read from. If those offsets pointed beyond the end of the file this could lead to an infinite loop. Virtual Machine Monitors using the linux-loader crate could enter an infinite loop if the ELF header of the kernel they are loading was modified in a malicious manner.

Patches

The issue has been addressed in 0.8.1

Workarounds

The issue can be mitigated by ensuring that only trusted kernel images are loaded or by verifying that the headers to not point beyond the end of the file.

References

See: https://github.com/rust-vmm/linux-loader/pull/125

Permalink: https://github.com/advisories/GHSA-52h2-m2cf-9jh6
JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS01MmgyLW0yY2YtOWpoNs4AAwRz
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Low
Classification: General
Published: almost 2 years ago
Updated: almost 2 years ago


CVSS Score: 1.9
CVSS vector: CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L

Identifiers: GHSA-52h2-m2cf-9jh6, CVE-2022-23523
References: Repository: https://github.com/rust-vmm/linux-loader
Blast Radius: 4.2

Affected Packages

cargo:linux-loader
Dependent packages: 0
Dependent repositories: 166
Downloads: 1,634,539 total
Affected Version Ranges: < 0.8.1
Fixed in: 0.8.1
All affected versions: 0.1.0, 0.2.0, 0.3.0, 0.4.0, 0.5.0, 0.6.0, 0.7.0, 0.8.0
All unaffected versions: 0.8.1, 0.9.0, 0.9.1, 0.10.0, 0.11.0, 0.12.0, 0.13.0