CVE-2021-28034: Double free in stack_dst
(updated )
Affected versions of stack_dst used a push_inner function that increased the internal length of the array and then called val.clone(). If the val.clone() call panics, the stack could drop an already dropped element or drop uninitialized memory. This issue was fixed in 2a4d538
by increasing the length of the array after elements are cloned.
References
- github.com/advisories/GHSA-8mjx-h23h-w2pg
- github.com/thepowersgang/stack_dst-rs
- github.com/thepowersgang/stack_dst-rs/commit/2a4d538
- github.com/thepowersgang/stack_dst-rs/commit/2a4d53809e3000f40085f2b229b6b1a33759881d
- github.com/thepowersgang/stack_dst-rs/issues/5
- nvd.nist.gov/vuln/detail/CVE-2021-28034
- rustsec.org/advisories/RUSTSEC-2021-0033.html
Detect and mitigate CVE-2021-28034 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →