CVE-2024-43806Uncontrolled Resource Consumption in Rustix

Severity
6.5MEDIUMNVD
EPSS
0.1%
top 75.79%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedAug 26

Description

Rustix is a set of safe Rust bindings to POSIX-ish APIs. When using `rustix::fs::Dir` using the `linux_raw` backend, it's possible for the iterator to "get stuck" when an IO error is encountered. Combined with a memory over-allocation issue in `rustix::fs::Dir::read_more`, this can cause quick and unbounded memory explosion (gigabytes in a few seconds if used on a hot path) and eventually lead to an OOM crash of the application. The symptoms were initially discovered in https://github.com/imsnif

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:HExploitability: 2.8 | Impact: 3.6

Affected Packages18 packages

🔴Vulnerability Details

3
OSV
CVE-2024-43806: Rustix is a set of safe Rust bindings to POSIX-ish APIs2024-08-26
OSV
rustix's `rustix::fs::Dir` iterator with the `linux_raw` backend can cause memory explosion2023-10-18
GHSA
rustix's `rustix::fs::Dir` iterator with the `linux_raw` backend can cause memory explosion2023-10-18

📋Vendor Advisories

2
Microsoft
`rustix::fs::Dir` iterator with the `linux_raw` backend can cause memory explosion2024-08-13
Debian
CVE-2024-43806: rust-rustix - Rustix is a set of safe Rust bindings to POSIX-ish APIs. When using `rustix::fs:...2024
CVE-2024-43806 — Uncontrolled Resource Consumption | cvebase