CVE-2021-28034 – stack_dst
Package
Manager: cargo
Name: stack_dst
Vulnerable Version: >=0 <0.6.1
Severity
Level: Critical
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
EPSS: 0.00418 pctl0.61036
Details
Double free in stack_dst Affected versions of stack_dst used a push_inner function that increased the internal length of the array and then called val.clone(). If the val.clone() call panics, the stack could drop an already dropped element or drop uninitialized memory. This issue was fixed in `2a4d538` by increasing the length of the array after elements are cloned.
Metadata
Created: 2021-09-01T18:30:44Z
Modified: 2023-06-13T20:52:43Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2021/09/GHSA-8mjx-h23h-w2pg/GHSA-8mjx-h23h-w2pg.json
CWE IDs: ["CWE-415"]
Alternative ID: GHSA-8mjx-h23h-w2pg
Finding: F138
Auto approve: 1