RUSTSEC-2024-0406

Source
https://rustsec.org/advisories/RUSTSEC-2024-0406
Import Source
https://github.com/rustsec/advisory-db/blob/osv/crates/RUSTSEC-2024-0406.json
JSON Data
https://api.osv.dev/v1/vulns/RUSTSEC-2024-0406
Aliases
Published
2024-05-17T12:00:00Z
Modified
2024-12-04T12:58:50.176116Z
Severity
  • 5.9 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
BTreeMap memory leak when deallocating nodes with overflows
Details

When storing unbounded types in a BTreeMap, a node is represented as a linked list of "memory chunks". In some cases, when we deallocate a node only the first memory chunk is deallocated, and the rest of the memory chunks remain (incorrectly) allocated, causing a memory leak.

In the worst case, depending on how a canister uses the BTreeMap, an adversary could interact with the canister through its API and trigger interactions with the map that keep consuming memory due to the memory leak. This could potentially lead to using an excessive amount of memory, or even running out of memory.

This issue has been fixed in dfinity/stable-structures/pull/212 by changing the logic for deallocating nodes to ensure that all of a node's memory chunks are deallocated. Tests have been added to prevent regressions of this nature moving forward.

Note: Users of stable-structure < 0.6.0 are not affected.

Workarounds

Users who are not storing unbounded types in BTreeMap are not affected and do not need to upgrade. Otherwise, an upgrade to version 0.6.4 is necessary.

References

Database specific
{
    "license": "CC0-1.0"
}
References

Affected packages

crates.io / ic-stable-structures

Package

Name
ic-stable-structures
View open source insights on deps.dev
Purl
pkg:cargo/ic-stable-structures

Affected ranges

Type
SEMVER
Events
Introduced
0.6.0
Fixed
0.6.4

Ecosystem specific

{
    "affected_functions": null,
    "affects": {
        "os": [],
        "functions": [],
        "arch": []
    }
}

Database specific

{
    "cvss": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
    "informational": null,
    "categories": [
        "denial-of-service"
    ]
}