Bug 1218499 (CVE-2023-50711) - VUL-0: CVE-2023-50711: TRACKERBUG: vmm-sys-util: out of bounds memory accesses
Summary: VUL-0: CVE-2023-50711: TRACKERBUG: vmm-sys-util: out of bounds memory accesses
Status: IN_PROGRESS
Alias: CVE-2023-50711
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: Other Other
: P3 - Medium : Normal
Target Milestone: ---
Assignee: Security Team bot
QA Contact: Security Team bot
URL: https://smash.suse.de/issue/389863/
Whiteboard: CVSSv3.1:SUSE:CVE-2023-50711:5.7:(AV:...
Keywords:
Depends on: 1218502 1218500 1218501
Blocks:
  Show dependency treegraph
 
Reported: 2024-01-03 10:18 UTC by SMASH SMASH
Modified: 2024-02-13 09:47 UTC (History)
1 user (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description SMASH SMASH 2024-01-03 10:18:14 UTC
vmm-sys-util is a collection of modules that provides helpers and utilities used by multiple rust-vmm components. Starting in version 0.5.0 and prior to version 0.12.0, an issue in the `FamStructWrapper::deserialize` implementation provided by the crate for `vmm_sys_util::fam::FamStructWrapper` can lead to out of bounds memory accesses. The deserialization does not check that the length stored in the header matches the flexible array length. Mismatch in the lengths might allow out of bounds memory access through Rust-safe methods. The issue was corrected in version 0.12.0 by inserting a check that verifies the lengths of compared flexible arrays are equal for any deserialized header and aborting deserialization otherwise. Moreover, the API was changed so that header length can only be modified through Rust-unsafe code. This ensures that users cannot trigger out-of-bounds memory access from Rust-safe code.

References:
https://github.com/rust-vmm/vmm-sys-util/security/advisories/GHSA-875g-mfp6-g7f9
https://github.com/rust-vmm/vmm-sys-util/commit/30172fca2a8e0a38667d934ee56682247e13f167
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-50711
Comment 1 Thomas Leroy 2024-01-03 10:19:52 UTC
vmm-sys-util crate is embedded in the following:

- SUSE:ALP:Source:Standard:1.0/virtiofsd,1,vmm-sys-util,0.11.1
- SUSE:SLE-15-SP4:Update/aws-nitro-enclaves-cli,1,vmm-sys-util,0.8.0
- SUSE:SLE-15-SP5:Update/sevctl,1,vmm-sys-util,0.11.0
- openSUSE:Factory/aws-nitro-enclaves-cli,5,vmm-sys-util,0.8.0
- openSUSE:Factory/firecracker,9,vmm-sys-util,0.11.0
- openSUSE:Factory/libkrun,10,vmm-sys-util,0.11.1
- openSUSE:Factory/sevctl,6,vmm-sys-util,0.11.1
- openSUSE:Factory/virtiofsd,3,vmm-sys-util,0.11.1

All of the above packages embed an affected version.
Comment 3 OBSbugzilla Bot 2024-01-24 17:35:03 UTC
This is an autogenerated message for OBS integration:
This bug (1218499) was mentioned in
https://build.opensuse.org/request/show/1141311 Factory / sevctl
Comment 4 Maintenance Automation 2024-01-26 16:30:11 UTC
SUSE-SU-2024:0250-1: An update that solves one vulnerability, contains one feature and has one security fix can now be installed.

Category: security (important)
Bug References: 1218499, 1218502
CVE References: CVE-2023-50711
Jira References: PED-4981
Sources used:
openSUSE Leap 15.5 (src): sevctl-0.4.3-150500.3.3.1
Server Applications Module 15-SP5 (src): sevctl-0.4.3-150500.3.3.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.