CVE-2024-7884
Sept. 12, 2024, 8:47 p.m.
Tags
CVSS Score
Products Impacted
Vendor | Product | Versions |
---|---|---|
dfinity |
|
|
Description
When a canister method is called via ic_cdk::call* , a new Future CallFuture is created and can be awaited by the caller to get the execution result. Internally, the state of the Future is tracked and stored in a struct called CallFutureState. A bug in the polling implementation of the CallFuture allows multiple references to be held for this internal state and not all references were dropped before the Future is resolved. Since we have unaccounted references held, a copy of the internal state ended up being persisted in the canister's heap and thus causing a memory leak. Impact Canisters built in Rust with ic_cdk and ic_cdk_timers are affected. If these canisters call a canister method, use timers or heartbeat, they will likely leak a small amount of memory on every such operation. In the worst case, this could lead to heap memory exhaustion triggered by an attacker. Motoko based canisters are not affected by the bug. PatchesThe patch has been backported to all minor versions between >= 0.8.0, <= 0.15.0. The patched versions available are 0.8.2, 0.9.3, 0.10.1, 0.11.6, 0.12.2, 0.13.5, 0.14.1, 0.15.1 and their previous versions have been yanked. WorkaroundsThere are no known workarounds at the moment. Developers are recommended to upgrade their canister as soon as possible to the latest available patched version of ic_cdk to avoid running out of Wasm heap memory. Upgrading the canisters (without updating `ic_cdk`) also frees the leaked memory but it's only a temporary solution.
Weaknesses
CWE-401
Missing Release of Memory after Effective Lifetime
The product does not sufficiently track and release allocated memory after it has been used, which slowly consumes remaining memory.
CWE ID: 401Date
Published: Sept. 5, 2024, 1:15 p.m.
Last Modified: Sept. 12, 2024, 8:47 p.m.
Status : Analyzed
CVE has been recently published to the CVE List and has been received by the NVD.
More infoSource
6b35d637-e00f-4228-858c-b20ad6e1d07b
CPEs
Type | Vendor | Product | Version | Update | Edition | Language | Software Edition | Target Software | Target Hardware | Other Information |
---|---|---|---|---|---|---|---|---|---|---|
a | dfinity | canister_developer_kit_for_the_internet_computer | / | / | / | / | / | rust | / | / |
a | dfinity | canister_developer_kit_for_the_internet_computer | / | / | / | / | / | rust | / | / |
a | dfinity | canister_developer_kit_for_the_internet_computer | / | / | / | / | / | rust | / | / |
a | dfinity | canister_developer_kit_for_the_internet_computer | / | / | / | / | / | rust | / | / |
a | dfinity | canister_developer_kit_for_the_internet_computer | / | / | / | / | / | rust | / | / |
a | dfinity | canister_developer_kit_for_the_internet_computer | 0.10.0 | / | / | / | / | rust | / | / |
a | dfinity | canister_developer_kit_for_the_internet_computer | 0.14.0 | / | / | / | / | rust | / | / |
a | dfinity | canister_developer_kit_for_the_internet_computer | 0.15.0 | / | / | / | / | rust | / | / |
CVSS Data
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
Base Score
Exploitability Score
Impact Score
Base Severity
HIGHCVSS Vector String
The CVSS vector string provides an in-depth view of the vulnerability metrics.
View Vector StringCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H