- Reported
-
- Issued
-
- Package
-
stack_dst
(crates.io)
- Type
-
Vulnerability
- Categories
-
- Keywords
-
#memory-safety
#double-free
- Aliases
-
- References
-
- CVSS Score
- 9.8
CRITICAL
- CVSS Details
-
- Attack Vector
- Network
- Attack Complexity
- Low
- Privileges Required
- None
- User Interaction
- None
- Scope
- Unchanged
- Confidentiality Impact
- High
- Integrity Impact
- High
- Availability Impact
- High
- CVSS Vector
- CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
- Patched
-
- Affected Functions
- Version
stack_dst::StackA::push_cloned
-
Description
Affected versions of stack_dst used a push_inner function that increased
the internal length of the array and then called val.clone().
If the val.clone() call panics, the stack could drop an already dropped
element or drop uninitialized memory.
This issue was fixed in 2a4d538 by increasing the length of the array after
elements are cloned.
Advisory available under CC0-1.0
license.