vulnerability
Arch Linux: Arbitrary code execution (CVE-2020-15254)
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 7 | (AV:N/AC:L/Au:N/C:P/I:P/A:P) | Oct 16, 2020 | Jul 11, 2025 | Nov 27, 2025 |
Severity
7
CVSS
(AV:N/AC:L/Au:N/C:P/I:P/A:P)
Published
Oct 16, 2020
Added
Jul 11, 2025
Modified
Nov 27, 2025
Description
An undefined behaviour leading to memory corruption issues has been found in the crossbeam rust crate <= 0.4.3. The "bounded" channel incorrectly assumes that "Vec::from_iter" has allocated enough capacity for the number of iterator elements. "Vec::from_iter" does not actually guarantee that and may allocate extra memory. The destructor of the "bounded" channel reconstructs "Vec" from the raw pointer based on the incorrect assumptions described above. This is unsound and causing deallocation with the incorrect capacity when the size allocated by "Vec::from_iter" differs from the number of iterator elements.
Solution
arch-linux-upgrade-latest
References
- CVE-2020-15254
- https://attackerkb.com/topics/CVE-2020-15254
- URL-https://github.com/RustSec/advisory-db/pull/425
- URL-https://github.com/crossbeam-rs/crossbeam/issues/539
- URL-https://github.com/crossbeam-rs/crossbeam/pull/533
- URL-https://github.com/crossbeam-rs/crossbeam/security/advisories/GHSA-v5m7-53cv-f3hx
- URL-https://security.archlinux.org/ASA-202011-1
- URL-https://www.mozilla.org/en-US/security/advisories/mfsa2020-45/
- CWE-119
- CWE-401
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.