Double Free Affecting crossbeam package, versions <0.4.1


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.21% (59th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Double Free vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-RUST-CROSSBEAM-72704
  • published18 Dec 2018
  • disclosed9 Dec 2018
  • creditc0gent

Introduced: 9 Dec 2018

CVE-2018-20996  (opens in a new tab)
CWE-400  (opens in a new tab)

How to fix?

Upgrade crossbeam to version 0.4.1 or higher.

Overview

crossbeam is a package that provides a set of tools for concurrent programming.

Affected versions of this package are vulnerable to Double Free due to running element's destructor inside the epoch-based garbage collector.

Double free errors occur when free() is called more than once with the same memory address as an argument.

Details

Calling free() twice on the same value can lead to memory leak. When a program calls free() twice with the same argument, the program's memory management data structures become corrupted and could allow a malicious user to write values in arbitrary memory spaces. This corruption can cause the program to crash or, in some circumstances, alter the execution flow. By overwriting particular registers or memory spaces, an attacker can trick the program into executing code of his/her own choosing, often resulting in an interactive shell with elevated permissions.

CVSS Scores

version 3.1