RUSTSEC-2021-0130

Source
https://rustsec.org/advisories/RUSTSEC-2021-0130
Import Source
https://github.com/rustsec/advisory-db/blob/osv/crates/RUSTSEC-2021-0130.json
JSON Data
https://api.osv.dev/v1/vulns/RUSTSEC-2021-0130
Aliases
Published
2021-12-21T12:00:00Z
Modified
2023-11-08T04:07:23.861888Z
Summary
Use after free in lru crate
Details

Lru crate has use after free vulnerability.

Lru crate has two functions for getting an iterator. Both iterators give references to key and value. Calling specific functions, like pop(), will remove and free the value, and but it's still possible to access the reference of value which is already dropped causing use after free.

Database specific
{
    "license": "CC0-1.0"
}
References

Affected packages

crates.io / lru

Package

Affected ranges

Type
SEMVER
Events
Introduced
0.0.0-0
Fixed
0.7.1

Ecosystem specific

{
    "affected_functions": null,
    "affects": {
        "os": [],
        "functions": [
            "lru::LruCache::iter",
            "lru::LruCache::iter_mut"
        ],
        "arch": []
    }
}

Database specific

{
    "cvss": null,
    "informational": null,
    "categories": [
        "memory-corruption"
    ]
}