Files
advisory-db/crates/versionize/RUSTSEC-2023-0030.md
2023-06-13 15:10:24 +02:00

22 lines
945 B
Markdown

```toml
[advisory]
id = "RUSTSEC-2023-0030"
package = "versionize"
date = "2023-03-24"
url = "https://github.com/firecracker-microvm/versionize/pull/53"
categories = ["memory-exposure"]
cvss = "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:L"
aliases = ["CVE-2023-28448", "GHSA-8vxc-r5wp-vgvc"]
[affected]
os = ["linux"]
[versions]
patched = [">= 0.1.10"]
```
# `Versionize::deserialize` implementation for `FamStructWrapper<T>` is lacking bound checks, potentially leading to out of bounds memory accesses
An issue was discovered in the `Versionize::deserialize` implementation provided by the `versionize` crate for `vmm_sys_util::fam::FamStructWrapper`, which can lead to out of bounds memory accesses. The impact started with version 0.1.1. The issue was corrected in version 0.1.10 by inserting a check that verifies, for any deserialized header, the lengths of compared flexible arrays are equal and aborting deserialization otherwise.