GHSA-w443-5h3j-jqcp – crossbeam-channel
Package
Manager: cargo
Name: crossbeam-channel
Vulnerable Version: <0
Severity
Level: Medium
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L
CVSS v4.0: N/A
EPSS: N/A pctlN/A
Details
Duplicate Advisory: crossbeam-channel Vulnerable to Double Free on Drop ### Duplicate Advisory This advisory has been withdrawn because it is a duplicate of GHSA-pg9f-39pc-qf8g. This link is maintained to preserve external references. ### Original Description In crossbeam-channel rust crate, the internal `Channel` type's `Drop` method has a race condition which could, in some circumstances, lead to a double-free that could result in memory corruption.
Metadata
Created: 2025-05-14T00:32:21Z
Modified: 2025-05-15T18:26:22Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2025/05/GHSA-w443-5h3j-jqcp/GHSA-w443-5h3j-jqcp.json
CWE IDs: ["CWE-415"]
Alternative ID: N/A
Finding: N/A
Auto approve: 0