- Reported
-
- Issued
-
- Package
-
internment
(crates.io)
- Type
-
Vulnerability
- Categories
-
- Aliases
-
- References
-
- CVSS Score
- 8.1
HIGH
- CVSS Details
-
- Attack vector
- Network
- Attack complexity
- High
- Privileges required
- None
- User interaction
- None
- Scope
- Unchanged
- Confidentiality
- High
- Integrity
- High
- Availability
- High
- CVSS Vector
- CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
- Patched
-
- Unaffected
-
- Affected Functions
- Version
internment::ArcIntern::drop
-
Description
ArcIntern::drop
has a race condition where it can release memory
which is about to get another user. The new user will get a reference
to freed memory.
This was fixed by serializing access to an interned object while it
is being deallocated.
Versions prior to 0.3.12 used stronger locking which avoided the problem.
Advisory available under CC0-1.0
license.