Skip to content

x/vulndb: potential Go vuln in github.com/crossbeam-rs/crossbeam: CVE-2020-15254 #2284

Closed
@tatianab

Description

@tatianab

CVE-2020-15254 references github.com/crossbeam-rs/crossbeam, which may be a Go module.

Description:
Crossbeam is a set of tools for concurrent programming. In crossbeam-channel before version 0.4.4, the bounded channel incorrectly assumes that Vec::from_iter has allocated capacity that same as the number of iterator elements. Vec::from_iter does not actually guarantee that and may allocate extra memory. The destructor of the bounded channel reconstructs Vec from the raw pointer based on the incorrect assumes described above. This is unsound and causing deallocation with the incorrect capacity when Vec::from_iter has allocated different sizes with the number of iterator elements. This has been fixed in crossbeam-channel 0.4.4.

References:

Cross references:

See doc/triage.md for instructions on how to triage this report.

modules:
    - module: github.com/crossbeam-rs/crossbeam
      vulnerable_at: 0.6.1
      packages:
        - package: crossbeam
cves:
    - CVE-2020-15254
references:
    - advisory: https://github.com/crossbeam-rs/crossbeam/security/advisories/GHSA-v5m7-53cv-f3hx
    - report: https://github.com/crossbeam-rs/crossbeam/issues/539
    - fix: https://github.com/crossbeam-rs/crossbeam/pull/533
    - fix: https://github.com/RustSec/advisory-db/pull/425

Metadata

Metadata

Assignees

No one assigned

    Labels

    excluded: LEGACY_FALSE_POSITIVE(DO NOT USE) Vulnerability marked as false positive before we introduced the triage process

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions