Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLThtangtaDIzaC13MnBn
Double free in stack_dst
Affected versions of stack_dst used a push_inner function that increased the internal length of the array and then called val.clone(). If the val.clone() call panics, the stack could drop an already dropped element or drop uninitialized memory. This issue was fixed in 2a4d538
by increasing the length of the array after elements are cloned.
JSON: https://advisories.ecosyste.ms/api/v1/advisories/MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLThtangtaDIzaC13MnBn
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Critical
Classification: General
Published: over 2 years ago
Updated: 11 months ago
CVSS Score: 9.8
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Identifiers: GHSA-8mjx-h23h-w2pg, CVE-2021-28034
References:
- https://nvd.nist.gov/vuln/detail/CVE-2021-28034
- https://github.com/thepowersgang/stack_dst-rs/commit/2a4d53809e3000f40085f2b229b6b1a33759881d
- https://rustsec.org/advisories/RUSTSEC-2021-0033.html
- https://github.com/thepowersgang/stack_dst-rs/issues/5
- https://github.com/thepowersgang/stack_dst-rs/commit/2a4d538
- https://github.com/advisories/GHSA-8mjx-h23h-w2pg
Blast Radius: 8.3
Affected Packages
cargo:stack_dst
Dependent packages: 4Dependent repositories: 7
Downloads: 33,107 total
Affected Version Ranges: < 0.6.1
Fixed in: 0.6.1
All affected versions: 0.0.1, 0.1.0, 0.1.1, 0.2.0, 0.2.1, 0.3.0, 0.3.1, 0.4.0, 0.4.1, 0.4.2, 0.4.3, 0.5.0, 0.6.0
All unaffected versions: 0.6.1, 0.7.0, 0.7.1, 0.7.2, 0.8.1