First published: Mon Aug 02 2021(Updated: )
crossbeam-deque is a package of work-stealing deques for building task schedulers when programming in Rust. In versions prior to 0.7.4 and 0.8.0, the result of the race condition is that one or more tasks in the worker queue can be popped twice instead of other tasks that are forgotten and never popped. If tasks are allocated on the heap, this can cause double free and a memory leak. If not, this still can cause a logical bug. Crates using `Stealer::steal`, `Stealer::steal_batch`, or `Stealer::steal_batch_and_pop` are affected by this issue. This has been fixed in crossbeam-deque 0.8.1 and 0.7.4.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Crossbeam Project Crossbeam | <0.7.4 | |
Crossbeam Project Crossbeam | >=0.8.0<0.8.1 | |
Fedoraproject Fedora | =34 | |
<93 | 93 | |
<91.2 | 91.2 | |
Mozilla Thunderbird | <91.2 | 91.2 |
<91.2 | 91.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2021-32810 is a vulnerability in the crossbeam crate that can result in one or more tasks in the worker queue being popped twice.
Mozilla Thunderbird, Mozilla Firefox, Mozilla Firefox ESR, Crossbeam Project Crossbeam, and Fedora 34 are affected by CVE-2021-32810.
CVE-2021-32810 has a severity rating of 9.8 (Critical).
To fix CVE-2021-32810, update to the latest version of the affected software products or apply the recommended patches.
More information about CVE-2021-32810 can be found on the following references: [Link 1](https://bugzilla.mozilla.org/show_bug.cgi?id=1729813), [Link 2](https://github.com/crossbeam-rs/crossbeam/security/advisories/GHSA-pqqp-xmhj-wgcw), [Link 3](https://www.mozilla.org/en-US/security/advisories/mfsa2021-47/).