CVE-2023-41051: Default functions in VolatileMemory trait lack bounds checks, potentially leading to out-of-bounds memory accesses
(updated )
An issue was discovered in the default implementations of the VolatileMemory::{get_atomic_ref, aligned_as_ref, aligned_as_mut, get_ref, get_array_ref}
trait functions, which allows out-of-bounds memory access if the VolatileMemory::get_slice
function returns a VolatileSlice
whose length is less than the function’s count
argument. No implementations of get_slice
provided in vm_memory
are affected. Users of custom VolatileMemory
implementations may be impacted if the custom implementation does not adhere to get_slice
’s documentation.
References
- crates.io/crates/vm-memory/0.12.2
- github.com/advisories/GHSA-49hh-fprx-m68g
- github.com/rust-vmm/vm-memory
- github.com/rust-vmm/vm-memory/commit/aff1dd4a5259f7deba56692840f7a2d9ca34c9c8
- github.com/rust-vmm/vm-memory/issues/250
- github.com/rust-vmm/vm-memory/security/advisories/GHSA-49hh-fprx-m68g
- lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IPXRXD5VXBZHBGMUM77B52CJJMG7EJGI
- lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SYM6CYW2DWRHRAVL2HYTQPXC3J2V77J4
- lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XZGJL6BQLU4XCPQLLTW4GSSBTNQXB3TI
- nvd.nist.gov/vuln/detail/CVE-2023-41051
- rustsec.org/advisories/RUSTSEC-2023-0056.html
Detect and mitigate CVE-2023-41051 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →