The internal Channel
type's Drop
method has a race
which could, in some circumstances, lead to a double-free.
This could result in memory corruption.
Quoting from the upstream description in merge request #1187:
The problem lies in the fact that
dicard_all_messages
contained two paths that could lead tohead.block
being read but only one of them would swap the value. This meant thatdicard_all_messages
could end up observing a non-null block pointer (and therefore attempting to free it) without settinghead.block
to null. This would then lead toChannel::drop
making a second attempt at dropping the same pointer.
The bug was introduced while fixing a memory leak, in upstream MR #1084, first published in 0.5.12.
The fix is in upstream MR #1187 and has been published in 0.5.15
{ "nvd_published_at": null, "cwe_ids": [ "CWE-415" ], "severity": "MODERATE", "github_reviewed": true, "github_reviewed_at": "2025-04-10T14:30:39Z" }