First published: Fri Oct 16 2020(Updated: )
Crossbeam is a set of tools for concurrent programming. In crossbeam-channel before version 0.4.4, the bounded channel incorrectly assumes that `Vec::from_iter` has allocated capacity that same as the number of iterator elements. `Vec::from_iter` does not actually guarantee that and may allocate extra memory. The destructor of the `bounded` channel reconstructs `Vec` from the raw pointer based on the incorrect assumes described above. This is unsound and causing deallocation with the incorrect capacity when `Vec::from_iter` has allocated different sizes with the number of iterator elements. This has been fixed in crossbeam-channel 0.4.4.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Crossbeam Project Crossbeam | <0.4.4 | |
Mozilla Firefox | <82 | 82 |
<82 | 82 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
The vulnerability ID is CVE-2020-15254.
The severity of CVE-2020-15254 is high.
Mozilla Firefox up to version 82 is affected by CVE-2020-15254.
To fix CVE-2020-15254, update Mozilla Firefox to version 82 or above.
You can find more information about CVE-2020-15254 at the following references: [Bugzilla](https://bugzilla.mozilla.org/show_bug.cgi?id=1668514), [GitHub Security Advisory](https://github.com/crossbeam-rs/crossbeam/security/advisories/GHSA-v5m7-53cv-f3hx), [Mozilla Security Advisories](https://www.mozilla.org/en-US/security/advisories/mfsa2020-45/).