Double free in stack_dst
Critical severity
GitHub Reviewed
Published
Sep 1, 2021
to the GitHub Advisory Database
•
Updated Jun 13, 2023
Description
Published by the National Vulnerability Database
Mar 5, 2021
Reviewed
Aug 30, 2021
Published to the GitHub Advisory Database
Sep 1, 2021
Last updated
Jun 13, 2023
Affected versions of stack_dst used a push_inner function that increased the internal length of the array and then called val.clone(). If the val.clone() call panics, the stack could drop an already dropped element or drop uninitialized memory. This issue was fixed in
2a4d538
by increasing the length of the array after elements are cloned.References