Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLTQ1dzctN2c2My0ybTV3
Drop of uninitialized memory in stack_dst
Affected versions of stack_dst used a push_inner function that increased the internal length of the array and then called val.clone(). If the val.clone() call panics, the stack could drop an already dropped element or drop uninitialized memory. This issue was fixed in 2a4d538
by increasing the length of the array after elements are cloned.
JSON: https://advisories.ecosyste.ms/api/v1/advisories/MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLTQ1dzctN2c2My0ybTV3
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Critical
Classification: General
Published: over 2 years ago
Updated: 11 months ago
CVSS Score: 9.8
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Identifiers: GHSA-45w7-7g63-2m5w, CVE-2021-28035
References:
- https://nvd.nist.gov/vuln/detail/CVE-2021-28035
- https://github.com/thepowersgang/stack_dst-rs/issues/5
- https://github.com/thepowersgang/stack_dst-rs/commit/2a4d538
- https://rustsec.org/advisories/RUSTSEC-2021-0033.html
- https://github.com/advisories/GHSA-45w7-7g63-2m5w
Blast Radius: 8.3
Affected Packages
cargo:stack_dst
Dependent packages: 4Dependent repositories: 7
Downloads: 35,320 total
Affected Version Ranges: < 0.6.1
Fixed in: 0.6.1
All affected versions: 0.0.1, 0.1.0, 0.1.1, 0.2.0, 0.2.1, 0.3.0, 0.3.1, 0.4.0, 0.4.1, 0.4.2, 0.4.3, 0.5.0, 0.6.0
All unaffected versions: 0.6.1, 0.7.0, 0.7.1, 0.7.2, 0.8.1