Description
In IoT Devices SDK, there is an implementation of calloc() that doesn't have a length check. An attacker could pass in memory objects larger than the buffer and wrap around to have a smaller buffer than required, allowing the attacker access to the other parts of the heap. We recommend upgrading the Google Cloud IoT Device SDK for Embedded C used to 1.0.3 or greater.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2021-9688 | In IoT Devices SDK, there is an implementation of calloc() that doesn't have a length check. An attacker could pass in memory objects larger than the buffer and wrap around to have a smaller buffer than required, allowing the attacker access to the other parts of the heap. We recommend upgrading the Google Cloud IoT Device SDK for Embedded C used to 1.0.3 or greater. |
References
History
No history.
Status: PUBLISHED
Assigner: Google
Published:
Updated: 2024-08-03T18:44:13.675Z
Reserved: 2021-01-05T00:00:00.000Z
Link: CVE-2021-22547
No data.
Status : Modified
Published: 2021-05-04T13:15:07.427
Modified: 2024-11-21T05:50:18.583
Link: CVE-2021-22547
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD