rust-vmm vm-memory before 0.1.1 and 0.2.x before 0.2.1 allows attackers to cause a denial of service (loss of IP networking) because read_obj and write_obj do not properly access memory. This affects aarch64 (with musl or glibc) and x86_64 (with musl).
The product contains a concurrent code sequence that requires temporary, exclusive access to a shared resource, but a timing window exists in which the shared resource can be modified by another code sequence operating concurrently.
Link | Tags |
---|---|
https://github.com/rust-vmm/vm-memory/issues/93 | technical description |
https://github.com/rust-vmm/vm-memory/releases/tag/v0.1.1 | third party advisory release notes |
https://github.com/rust-vmm/vm-memory/releases/tag/v0.2.1 | third party advisory release notes |