Buffer Overflow Affecting crossbeam package, versions <0.4.4


Severity

Recommended
0.0
high
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

Exploit Maturity
Proof of Concept
EPSS
0.51% (66th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Buffer Overflow vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-RUST-CROSSBEAM-1019357
  • published18 Oct 2020
  • disclosed18 Oct 2020
  • creditUnknown

Introduced: 18 Oct 2020

CVE-2020-15254  (opens in a new tab)
CWE-119  (opens in a new tab)

How to fix?

Upgrade crossbeam to version 0.4.4 or higher.

Overview

crossbeam is a package that provides a set of tools for concurrent programming.

Affected versions of this package are vulnerable to Buffer Overflow. It causes deallocation with the incorrect capacity when Vec::from_iter has allocated different sizes with the number of iterator elements.

NOTE: This vulnerability has also been identified as: CVE-2020-35904

CVSS Base Scores

version 3.1