Description
CVE-2020-15254 references github.com/crossbeam-rs/crossbeam, which may be a Go module.
Description:
Crossbeam is a set of tools for concurrent programming. In crossbeam-channel before version 0.4.4, the bounded channel incorrectly assumes that Vec::from_iter
has allocated capacity that same as the number of iterator elements. Vec::from_iter
does not actually guarantee that and may allocate extra memory. The destructor of the bounded
channel reconstructs Vec
from the raw pointer based on the incorrect assumes described above. This is unsound and causing deallocation with the incorrect capacity when Vec::from_iter
has allocated different sizes with the number of iterator elements. This has been fixed in crossbeam-channel 0.4.4.
References:
- NIST: https://nvd.nist.gov/vuln/detail/CVE-2020-15254
- advisory: GHSA-v5m7-53cv-f3hx
- report: Memory Leak in crossbeam-queue ArrayQueue? (Latest git only, ver0.2.3 is not effected) crossbeam-rs/crossbeam#539
- fix: Use Box<[T]> instead of Vec<T> to initialize and drop ArrayQueue crossbeam-rs/crossbeam#533
- fix: Add advisory for UB in crossbeam-channel 0.4.3 rustsec/advisory-db#425
- Imported by: https://pkg.go.dev/github.com/crossbeam-rs/crossbeam?tab=importedby
Cross references:
- Module github.com/crossbeam-rs/crossbeam appears in issue x/vulndb: potential Go vuln in github.com/crossbeam-rs/crossbeam: CVE-2022-23639 #323 NOT_GO_CODE
See doc/triage.md for instructions on how to triage this report.
modules:
- module: github.com/crossbeam-rs/crossbeam
vulnerable_at: 0.6.1
packages:
- package: crossbeam
cves:
- CVE-2020-15254
references:
- advisory: https://github.com/crossbeam-rs/crossbeam/security/advisories/GHSA-v5m7-53cv-f3hx
- report: https://github.com/crossbeam-rs/crossbeam/issues/539
- fix: https://github.com/crossbeam-rs/crossbeam/pull/533
- fix: https://github.com/RustSec/advisory-db/pull/425