Description
From version 0.2.14 to 0.2.16 for Solana rBPF, function "relocate" in the file src/elf.rs has an integer overflow bug because the sym.st_value is read directly from ELF file without checking. If the sym.st_value is rather large, an integer overflow is triggered while calculating the variable "addr" via "addr = (sym.st_value + refd_pa) as u64";
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-0750 | From version 0.2.14 to 0.2.16 for Solana rBPF, function "relocate" in the file src/elf.rs has an integer overflow bug because the sym.st_value is read directly from ELF file without checking. If the sym.st_value is rather large, an integer overflow is triggered while calculating the variable "addr" via "addr = (sym.st_value + refd_pa) as u64"; |
Github GHSA |
GHSA-xwqr-xmgg-j69q | Integer overflow in solana_rbpf |
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-04T05:02:10.272Z
Reserved: 2022-01-03T00:00:00.000Z
Link: CVE-2021-46102
No data.
Status : Modified
Published: 2022-01-27T18:15:07.770
Modified: 2024-11-21T06:33:38.323
Link: CVE-2021-46102
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA