Логотип exploitDog
bind:CVE-2024-43806
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2024-43806

Количество 6

Количество 6

ubuntu логотип

CVE-2024-43806

больше 1 года назад

Rustix is a set of safe Rust bindings to POSIX-ish APIs. When using `rustix::fs::Dir` using the `linux_raw` backend, it's possible for the iterator to "get stuck" when an IO error is encountered. Combined with a memory over-allocation issue in `rustix::fs::Dir::read_more`, this can cause quick and unbounded memory explosion (gigabytes in a few seconds if used on a hot path) and eventually lead to an OOM crash of the application. The symptoms were initially discovered in https://github.com/imsnif/bandwhich/issues/284. That post has lots of details of our investigation. Full details can be read on the GHSA-c827-hfw6-qwvm repo advisory. If a program tries to access a directory with its file descriptor after the file has been unlinked (or any other action that leaves the `Dir` iterator in the stuck state), and the implementation does not break after seeing an error, it can cause a memory explosion. As an example, Linux's various virtual file systems (e.g. `/proc`, `/sys`) can contain di...

CVSS3: 6.5
EPSS: Низкий
nvd логотип

CVE-2024-43806

больше 1 года назад

Rustix is a set of safe Rust bindings to POSIX-ish APIs. When using `rustix::fs::Dir` using the `linux_raw` backend, it's possible for the iterator to "get stuck" when an IO error is encountered. Combined with a memory over-allocation issue in `rustix::fs::Dir::read_more`, this can cause quick and unbounded memory explosion (gigabytes in a few seconds if used on a hot path) and eventually lead to an OOM crash of the application. The symptoms were initially discovered in https://github.com/imsnif/bandwhich/issues/284. That post has lots of details of our investigation. Full details can be read on the GHSA-c827-hfw6-qwvm repo advisory. If a program tries to access a directory with its file descriptor after the file has been unlinked (or any other action that leaves the `Dir` iterator in the stuck state), and the implementation does not break after seeing an error, it can cause a memory explosion. As an example, Linux's various virtual file systems (e.g. `/proc`, `/sys`) can contain direc

CVSS3: 6.5
EPSS: Низкий
msrc логотип

CVE-2024-43806

12 месяцев назад

CVSS3: 6.5
EPSS: Низкий
debian логотип

CVE-2024-43806

больше 1 года назад

Rustix is a set of safe Rust bindings to POSIX-ish APIs. When using `r ...

CVSS3: 6.5
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:3404-1

больше 1 года назад

Security update for rage-encryption

EPSS: Низкий
github логотип

GHSA-c827-hfw6-qwvm

больше 2 лет назад

rustix's `rustix::fs::Dir` iterator with the `linux_raw` backend can cause memory explosion

CVSS3: 6.5
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2024-43806

Rustix is a set of safe Rust bindings to POSIX-ish APIs. When using `rustix::fs::Dir` using the `linux_raw` backend, it's possible for the iterator to "get stuck" when an IO error is encountered. Combined with a memory over-allocation issue in `rustix::fs::Dir::read_more`, this can cause quick and unbounded memory explosion (gigabytes in a few seconds if used on a hot path) and eventually lead to an OOM crash of the application. The symptoms were initially discovered in https://github.com/imsnif/bandwhich/issues/284. That post has lots of details of our investigation. Full details can be read on the GHSA-c827-hfw6-qwvm repo advisory. If a program tries to access a directory with its file descriptor after the file has been unlinked (or any other action that leaves the `Dir` iterator in the stuck state), and the implementation does not break after seeing an error, it can cause a memory explosion. As an example, Linux's various virtual file systems (e.g. `/proc`, `/sys`) can contain di...

CVSS3: 6.5
0%
Низкий
больше 1 года назад
nvd логотип
CVE-2024-43806

Rustix is a set of safe Rust bindings to POSIX-ish APIs. When using `rustix::fs::Dir` using the `linux_raw` backend, it's possible for the iterator to "get stuck" when an IO error is encountered. Combined with a memory over-allocation issue in `rustix::fs::Dir::read_more`, this can cause quick and unbounded memory explosion (gigabytes in a few seconds if used on a hot path) and eventually lead to an OOM crash of the application. The symptoms were initially discovered in https://github.com/imsnif/bandwhich/issues/284. That post has lots of details of our investigation. Full details can be read on the GHSA-c827-hfw6-qwvm repo advisory. If a program tries to access a directory with its file descriptor after the file has been unlinked (or any other action that leaves the `Dir` iterator in the stuck state), and the implementation does not break after seeing an error, it can cause a memory explosion. As an example, Linux's various virtual file systems (e.g. `/proc`, `/sys`) can contain direc

CVSS3: 6.5
0%
Низкий
больше 1 года назад
msrc логотип
CVSS3: 6.5
0%
Низкий
12 месяцев назад
debian логотип
CVE-2024-43806

Rustix is a set of safe Rust bindings to POSIX-ish APIs. When using `r ...

CVSS3: 6.5
0%
Низкий
больше 1 года назад
suse-cvrf логотип
SUSE-SU-2024:3404-1

Security update for rage-encryption

0%
Низкий
больше 1 года назад
github логотип
GHSA-c827-hfw6-qwvm

rustix's `rustix::fs::Dir` iterator with the `linux_raw` backend can cause memory explosion

CVSS3: 6.5
0%
Низкий
больше 2 лет назад

Уязвимостей на страницу