hello-world.rs
hello-world.rs copied to clipboard
CVE-2020-15254 (High) detected in crossbeam-queue-0.1.2.crate, crossbeam-channel-0.3.9.crate
CVE-2020-15254 - High Severity Vulnerability
Vulnerable Libraries - crossbeam-queue-0.1.2.crate, crossbeam-channel-0.3.9.crate
crossbeam-queue-0.1.2.crate
Concurrent queues
Library home page: https://crates.io/api/v1/crates/crossbeam-queue/0.1.2/download
Dependency Hierarchy:
- amethyst-0.15.3.crate (Root Library)
- amethyst_ui-0.15.3.crate
- amethyst_assets-0.15.3.crate
- :x: crossbeam-queue-0.1.2.crate (Vulnerable Library)
- amethyst_assets-0.15.3.crate
- amethyst_ui-0.15.3.crate
crossbeam-channel-0.3.9.crate
Multi-producer multi-consumer channels for message passing
Library home page: https://crates.io/api/v1/crates/crossbeam-channel/0.3.9/download
Dependency Hierarchy:
- amethyst-0.15.3.crate (Root Library)
- amethyst_ui-0.15.3.crate
- amethyst_rendy-0.15.3.crate
- rendy-0.4.1.crate
- rendy-resource-0.4.1.crate
- :x: crossbeam-channel-0.3.9.crate (Vulnerable Library)
- rendy-resource-0.4.1.crate
- rendy-0.4.1.crate
- amethyst_rendy-0.15.3.crate
- amethyst_ui-0.15.3.crate
Found in HEAD commit: a5a175063bd51fcbbce0eaba88d1b9b6ad315911
Found in base branch: master
Vulnerability Details
Crossbeam is a set of tools for concurrent programming. In crossbeam-channel before version 0.4.4, the bounded channel incorrectly assumes that Vec::from_iter
has allocated capacity that same as the number of iterator elements. Vec::from_iter
does not actually guarantee that and may allocate extra memory. The destructor of the bounded
channel reconstructs Vec
from the raw pointer based on the incorrect assumes described above. This is unsound and causing deallocation with the incorrect capacity when Vec::from_iter
has allocated different sizes with the number of iterator elements. This has been fixed in crossbeam-channel 0.4.4.
Publish Date: 2020-10-16
URL: CVE-2020-15254
CVSS 3 Score Details (9.8)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
Suggested Fix
Type: Upgrade version
Release Date: 2020-10-28
Fix Resolution: crossbeam-channel-0.4.4, crossbeam-0.8.0
Step up your Open Source Security Game with Mend here
LIES RUST:rocket: IS 100% SAFE
Vera Verba