From 63a2f9577175f2fd5eec9d22d0bf20810af0b1aa Mon Sep 17 00:00:00 2001 From: Patrick Roy Date: Sat, 25 Mar 2023 12:17:08 +0000 Subject: [PATCH] Add advisory for versionize crate (#1662) Signed-off-by: Patrick Roy --- crates/versionize/RUSTSEC-0000-0000.md | 21 +++++++++++++++++++++ 1 file changed, 21 insertions(+) create mode 100644 crates/versionize/RUSTSEC-0000-0000.md diff --git a/crates/versionize/RUSTSEC-0000-0000.md b/crates/versionize/RUSTSEC-0000-0000.md new file mode 100644 index 0000000..44dda92 --- /dev/null +++ b/crates/versionize/RUSTSEC-0000-0000.md @@ -0,0 +1,21 @@ +```toml +[advisory] +id = "RUSTSEC-0000-0000" +package = "versionize" +date = "2023-03-24" +url = "https://github.com/firecracker-microvm/versionize/pull/53" +categories = ["memory-exposure"] +cvss = "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:L" + +aliases = ["GHSA-8vxc-r5wp-vgvc"] + +[affected] +os = ["linux"] + +[versions] +patched = [">= 0.1.10"] +``` + +# `Versionize::deserialize` implementation for `FamStructWrapper` is lacking bound checks, potentially leading to out of bounds memory accesses + +An issue was discovered in the `Versionize::deserialize` implementation provided by the `versionize` crate for `vmm_sys_util::fam::FamStructWrapper`, which can lead to out of bounds memory accesses. The impact started with version 0.1.1. The issue was corrected in version 0.1.10 by inserting a check that verifies, for any deserialized header, the lengths of compared flexible arrays are equal and aborting deserialization otherwise.