CVE-2021-28035 – stack_dst
Package
Manager: cargo
Name: stack_dst
Vulnerable Version: >=0 <0.6.1
Severity
Level: Critical
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
EPSS: 0.00418 pctl0.61036
Details
Drop of uninitialized memory in stack_dst Affected versions of stack_dst used a push_inner function that increased the internal length of the array and then called val.clone(). If the val.clone() call panics, the stack could drop an already dropped element or drop uninitialized memory. This issue was fixed in `2a4d538` by increasing the length of the array after elements are cloned.
Metadata
Created: 2021-09-01T18:30:55Z
Modified: 2023-06-13T20:53:05Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2021/09/GHSA-45w7-7g63-2m5w/GHSA-45w7-7g63-2m5w.json
CWE IDs: ["CWE-908"]
Alternative ID: GHSA-45w7-7g63-2m5w
Finding: F138
Auto approve: 1