- Reported
-
- Issued
-
- Package
-
crossbeam
(crates.io)
- Type
-
Vulnerability
- Keywords
-
#concurrency
#memory-management
#memory-corruption
- Aliases
-
- References
-
- CVSS Score
- 9.8
CRITICAL
- CVSS Details
-
- Attack vector
- Network
- Attack complexity
- Low
- Privileges required
- None
- User interaction
- None
- Scope
- Unchanged
- Confidentiality
- High
- Integrity
- High
- Availability
- High
- CVSS Vector
- CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
- Patched
-
- Unaffected
-
Description
Even if an element is popped from a queue, crossbeam would run its
destructor inside the epoch-based garbage collector. This is a source
of double frees.
The flaw was corrected by wrapping elements inside queues in a
ManuallyDrop
.
Thanks to @c0gent for reporting the issue.
Advisory available under CC0-1.0
license.