File tree Expand file tree Collapse file tree 1 file changed +25
-0
lines changed
Expand file tree Collapse file tree 1 file changed +25
-0
lines changed Original file line number Diff line number Diff line change 1+ ``` toml
2+ [advisory ]
3+ id = " RUSTSEC-0000-0000"
4+ package = " xmas-elf"
5+ date = " 2025-03-26"
6+ url = " https://github.com/nrc/xmas-elf/issues/86"
7+ categories = [" memory-exposure" ]
8+
9+ [affected ]
10+ functions = { "xmas_elf::hash::HashTable::get_bucket" = [" <0.10" ], "xmas_elf::hash::HashTable::get_chain" = [" <0.10" ] }
11+
12+ [versions ]
13+ patched = [" >=0.10" ]
14+ ```
15+
16+ # Potential out-of-bounds read with a malformed ELF file and the HashTable API.
17+
18+ Affected versions of this crate only validated the ` index ` argument of
19+ ` HashTable::get_bucket ` and ` HashTable::get_chain ` against the input-controlled
20+ ` bucket_count ` and ` chain_count ` fields, but not against the size of the ELF
21+ section. As a result, a malformed ELF file could trigger out-of-bounds reads in
22+ a consumer of the HashTable API by setting these fields to inappropriately large
23+ values that would fall outside the relevant hash table section, and by
24+ introducing correspondingly out-of-bounds hash table indexes elsewhere in the ELF
25+ file.
You can’t perform that action at this time.
0 commit comments