RUSTSEC-2021-0033

push_cloned can drop uninitialized memory or double free on panic

Issued
Package
stack_dst (crates.io)
Type
Vulnerability
Categories
  • memory-corruption
Aliases
Details
https://github.com/thepowersgang/stack_dst-rs/issues/5
Patched
  • >=0.6.1
Keywords
  • memory-safety
  • double-free
Affected Functions
Version
stack_dst::StackA::push_cloned
  • <0.6.1

Description

Affected versions of stack_dst used a push_inner function that increased the internal length of the array and then called val.clone().

If the val.clone() call panics, the stack could drop an already dropped element or drop uninitialized memory.

This issue was fixed in 2a4d538 by increasing the length of the array after elements are cloned.

More