CVE-2022-36086

linked_list_allocator is an allocator usable for no_std systems. Prior to version 0.10.2, the heap initialization methods were missing a minimum size check for the given heap size argument. This could lead to out-of-bound writes when a heap was initialized with a size smaller than `3 * size_of::<usize>` because of metadata write operations. This vulnerability impacts all the initialization functions on the `Heap` and `LockedHeap` types, including `Heap::new`, `Heap::init`, `Heap::init_from_slice`, and `LockedHeap::new`. It also affects multiple uses of the `Heap::extend` method. Version 0.10.2 contains a patch for the issue. As a workaround, ensure that the heap is only initialized with a size larger than `3 * size_of::<usize>` and that the `Heap::extend` method is only called with sizes larger than `2 * size_of::<usize>()`. Also, ensure that the total heap size is (and stays) a multiple of `2 * size_of::<usize>()`.
Configurations

Configuration 1 (hide)

cpe:2.3:a:rust-osdev:linked-list-allocator:*:*:*:*:*:rust:*:*

History

21 Jul 2023, 19:23

Type Values Removed Values Added
CWE CWE-787
CWE-119
CWE-1284

Information

Published : 2022-09-07 23:15

Updated : 2024-02-28 19:29


NVD link : CVE-2022-36086

Mitre link : CVE-2022-36086

CVE.ORG link : CVE-2022-36086


JSON object : View

Products Affected

rust-osdev

  • linked-list-allocator
CWE
CWE-1284

Improper Validation of Specified Quantity in Input

CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer

CWE-787

Out-of-bounds Write