GHSA-8mjx-h23h-w2pg

Suggest an improvement
Source
https://github.com/advisories/GHSA-8mjx-h23h-w2pg
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2021/09/GHSA-8mjx-h23h-w2pg/GHSA-8mjx-h23h-w2pg.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-8mjx-h23h-w2pg
Aliases
Published
2021-09-01T18:30:44Z
Modified
2023-11-08T04:05:27.911039Z
Severity
  • 9.8 (Critical) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
Double free in stack_dst
Details

Affected versions of stackdst used a pushinner function that increased the internal length of the array and then called val.clone(). If the val.clone() call panics, the stack could drop an already dropped element or drop uninitialized memory. This issue was fixed in 2a4d538 by increasing the length of the array after elements are cloned.

Database specific
{
    "nvd_published_at": "2021-03-05T09:15:00Z",
    "cwe_ids": [
        "CWE-415"
    ],
    "severity": "CRITICAL",
    "github_reviewed": true,
    "github_reviewed_at": "2021-08-30T21:56:32Z"
}
References

Affected packages

crates.io / stack_dst

Package

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.6.1

Ecosystem specific

{
    "affected_functions": [
        "stack_dst::StackA::push_cloned"
    ]
}