ID CVE-2020-15254
Summary Crossbeam is a set of tools for concurrent programming. In crossbeam-channel before version 0.4.4, the bounded channel incorrectly assumes that `Vec::from_iter` has allocated capacity that same as the number of iterator elements. `Vec::from_iter` does not actually guarantee that and may allocate extra memory. The destructor of the `bounded` channel reconstructs `Vec` from the raw pointer based on the incorrect assumes described above. This is unsound and causing deallocation with the incorrect capacity when `Vec::from_iter` has allocated different sizes with the number of iterator elements. This has been fixed in crossbeam-channel 0.4.4.
References
Vulnerable Configurations
  • cpe:2.3:a:crossbeam_project:crossbeam:-:*:*:*:*:*:*:*
    cpe:2.3:a:crossbeam_project:crossbeam:-:*:*:*:*:*:*:*
  • cpe:2.3:a:crossbeam_project:crossbeam:-:*:*:*:*:rust:*:*
    cpe:2.3:a:crossbeam_project:crossbeam:-:*:*:*:*:rust:*:*
  • cpe:2.3:a:crossbeam_project:crossbeam:0.1.0:*:*:*:*:*:*:*
    cpe:2.3:a:crossbeam_project:crossbeam:0.1.0:*:*:*:*:*:*:*
  • cpe:2.3:a:crossbeam_project:crossbeam:0.1.0:*:*:*:*:rust:*:*
    cpe:2.3:a:crossbeam_project:crossbeam:0.1.0:*:*:*:*:rust:*:*
  • cpe:2.3:a:crossbeam_project:crossbeam:0.2.0:*:*:*:*:*:*:*
    cpe:2.3:a:crossbeam_project:crossbeam:0.2.0:*:*:*:*:*:*:*
  • cpe:2.3:a:crossbeam_project:crossbeam:0.2.0:*:*:*:*:rust:*:*
    cpe:2.3:a:crossbeam_project:crossbeam:0.2.0:*:*:*:*:rust:*:*
  • cpe:2.3:a:crossbeam_project:crossbeam:0.3.0:*:*:*:*:*:*:*
    cpe:2.3:a:crossbeam_project:crossbeam:0.3.0:*:*:*:*:*:*:*
  • cpe:2.3:a:crossbeam_project:crossbeam:0.3.0:*:*:*:*:rust:*:*
    cpe:2.3:a:crossbeam_project:crossbeam:0.3.0:*:*:*:*:rust:*:*
  • cpe:2.3:a:crossbeam_project:crossbeam:0.4.0:*:*:*:*:*:*:*
    cpe:2.3:a:crossbeam_project:crossbeam:0.4.0:*:*:*:*:*:*:*
  • cpe:2.3:a:crossbeam_project:crossbeam:0.4.0:*:*:*:*:rust:*:*
    cpe:2.3:a:crossbeam_project:crossbeam:0.4.0:*:*:*:*:rust:*:*
  • cpe:2.3:a:crossbeam_project:crossbeam:0.4.1:*:*:*:*:*:*:*
    cpe:2.3:a:crossbeam_project:crossbeam:0.4.1:*:*:*:*:*:*:*
  • cpe:2.3:a:crossbeam_project:crossbeam:0.4.1:*:*:*:*:rust:*:*
    cpe:2.3:a:crossbeam_project:crossbeam:0.4.1:*:*:*:*:rust:*:*
  • cpe:2.3:a:crossbeam_project:crossbeam:0.4.3:*:*:*:*:*:*:*
    cpe:2.3:a:crossbeam_project:crossbeam:0.4.3:*:*:*:*:*:*:*
  • cpe:2.3:a:crossbeam_project:crossbeam:0.4.3:*:*:*:*:rust:*:*
    cpe:2.3:a:crossbeam_project:crossbeam:0.4.3:*:*:*:*:rust:*:*
CVSS
Base: 7.5 (as of 05-08-2022 - 19:30)
Impact:
Exploitability:
CWE CWE-401
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL PARTIAL PARTIAL
cvss-vector via4 AV:N/AC:L/Au:N/C:P/I:P/A:P
refmap via4
confirm https://github.com/crossbeam-rs/crossbeam/security/advisories/GHSA-v5m7-53cv-f3hx
misc
Last major update 05-08-2022 - 19:30
Published 16-10-2020 - 17:15
Last modified 05-08-2022 - 19:30
Back to Top