icon

We found results for “

CVE-2022-36086

Date: September 7, 2022

linked_list_allocator is an allocator usable for no_std systems. Prior to version 0.10.2, the heap initialization methods were missing a minimum size check for the given heap size argument. This could lead to out-of-bound writes when a heap was initialized with a size smaller than "3 * size_of::<usize>" because of metadata write operations. This vulnerability impacts all the initialization functions on the "Heap" and "LockedHeap" types, including "Heap::new", "Heap::init", "Heap::init_from_slice", and "LockedHeap::new". It also affects multiple uses of the "Heap::extend" method. Version 0.10.2 contains a patch for the issue. As a workaround, ensure that the heap is only initialized with a size larger than "3 * size_of::<usize>" and that the "Heap::extend" method is only called with sizes larger than "2 * size_of::<usize>()". Also, ensure that the total heap size is (and stays) a multiple of "2 * size_of::<usize>()".

Language: RUST

Severity Score

Severity Score

Weakness Type (CWE)

Improper Restriction of Operations within the Bounds of a Memory Buffer

CWE-119

Out-of-bounds Write

CWE-787

Improper Validation of Specified Quantity in Input

CWE-1284

CVSS v3.1

Base Score:
Attack Vector (AV): LOCAL
Attack Complexity (AC): LOW
Privileges Required (PR): NONE
User Interaction (UI): NONE
Scope (S): UNCHANGED
Confidentiality (C): HIGH
Integrity (I): HIGH
Availability (A): HIGH

Do you need more information?

Contact Us