Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLTk2dzMtcDM2OC00aDhj
Use after free in internment
ArcIntern::drop has a race condition where it can release memory which is about to get another user. The new user will get a reference to freed memory.
This was fixed by serializing access to an interned object while it is being deallocated.
Versions prior to 0.3.12 used stronger locking which avoided the problem.
Permalink: https://github.com/advisories/GHSA-96w3-p368-4h8cJSON: https://advisories.ecosyste.ms/api/v1/advisories/MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLTk2dzMtcDM2OC00aDhj
Source: GitHub Advisory Database
Origin: Unspecified
Severity: High
Classification: General
Published: over 3 years ago
Updated: over 1 year ago
CVSS Score: 8.1
CVSS vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
Identifiers: GHSA-96w3-p368-4h8c, CVE-2020-35874
References:
- https://nvd.nist.gov/vuln/detail/CVE-2020-35874
- https://github.com/droundy/internment/issues/11
- https://rustsec.org/advisories/RUSTSEC-2020-0017.html
- https://github.com/advisories/GHSA-96w3-p368-4h8c
Blast Radius: 24.6
Affected Packages
cargo:internment
Dependent packages: 12Dependent repositories: 1,099
Downloads: 3,634,431 total
Affected Version Ranges: >= 0.3.12, < 0.4.0
Fixed in: 0.4.0
All affected versions: 0.3.12, 0.3.13
All unaffected versions: 0.1.0, 0.1.1, 0.2.0, 0.2.1, 0.2.2, 0.3.0, 0.3.1, 0.3.2, 0.3.3, 0.3.4, 0.3.5, 0.3.6, 0.3.7, 0.3.9, 0.3.10, 0.4.0, 0.4.1, 0.4.2, 0.5.0, 0.5.1, 0.5.2, 0.5.3, 0.5.4, 0.5.5, 0.5.6, 0.6.0, 0.7.0, 0.7.1, 0.7.2, 0.7.3, 0.7.4, 0.7.5, 0.8.0, 0.8.1, 0.8.2, 0.8.3, 0.8.4, 0.8.5, 0.8.6