Lookup for vulnerabilities affecting packages.

Vulnerability_idVCID-w377-ghca-5fff
Summary
Incorrect buffer size in crossbeam-channel
The affected version of this crate's the bounded channel incorrectly assumes that Vec::from_iter has allocated capacity that same as the number of iterator elements. Vec::from_iter does not actually guarantee that and may allocate extra memory. The destructor of the bounded channel reconstructs Vec from the raw pointer based on the incorrect assumes described above. This is unsound and causing deallocation with the incorrect capacity when Vec::from_iter has allocated different sizes with the number of iterator elements.
Aliases
0
alias CVE-2020-35904
1
alias GHSA-m8h8-v6jh-c762
Fixed_packages
0
url pkg:cargo/crossbeam-channel@0.4.4
purl pkg:cargo/crossbeam-channel@0.4.4
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:cargo/crossbeam-channel@0.4.4
1
url pkg:deb/debian/rust-crossbeam-channel@0.4.4-1?distro=trixie
purl pkg:deb/debian/rust-crossbeam-channel@0.4.4-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/rust-crossbeam-channel@0.4.4-1%3Fdistro=trixie
2
url pkg:deb/debian/rust-crossbeam-channel@0.4.4-1
purl pkg:deb/debian/rust-crossbeam-channel@0.4.4-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/rust-crossbeam-channel@0.4.4-1
3
url pkg:deb/debian/rust-crossbeam-channel@0.5.6-1?distro=trixie
purl pkg:deb/debian/rust-crossbeam-channel@0.5.6-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/rust-crossbeam-channel@0.5.6-1%3Fdistro=trixie
4
url pkg:deb/debian/rust-crossbeam-channel@0.5.15-1?distro=trixie
purl pkg:deb/debian/rust-crossbeam-channel@0.5.15-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/rust-crossbeam-channel@0.5.15-1%3Fdistro=trixie
Affected_packages
0
url pkg:cargo/crossbeam-channel@0.4.3
purl pkg:cargo/crossbeam-channel@0.4.3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-unmm-942j-gkh7
1
vulnerability VCID-w377-ghca-5fff
resource_url http://public2.vulnerablecode.io/packages/pkg:cargo/crossbeam-channel@0.4.3
1
url pkg:deb/debian/rust-crossbeam-channel@0.3.8-1
purl pkg:deb/debian/rust-crossbeam-channel@0.3.8-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-w377-ghca-5fff
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/rust-crossbeam-channel@0.3.8-1
References
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-35904
reference_id
reference_type
scores
0
value 0.00057
scoring_system epss
scoring_elements 0.17698
published_at 2026-04-21T12:55:00Z
1
value 0.00057
scoring_system epss
scoring_elements 0.17929
published_at 2026-04-04T12:55:00Z
2
value 0.00057
scoring_system epss
scoring_elements 0.1763
published_at 2026-04-07T12:55:00Z
3
value 0.00057
scoring_system epss
scoring_elements 0.17718
published_at 2026-04-08T12:55:00Z
4
value 0.00057
scoring_system epss
scoring_elements 0.17779
published_at 2026-04-09T12:55:00Z
5
value 0.00057
scoring_system epss
scoring_elements 0.17797
published_at 2026-04-11T12:55:00Z
6
value 0.00057
scoring_system epss
scoring_elements 0.17751
published_at 2026-04-12T12:55:00Z
7
value 0.00057
scoring_system epss
scoring_elements 0.17704
published_at 2026-04-13T12:55:00Z
8
value 0.00057
scoring_system epss
scoring_elements 0.17651
published_at 2026-04-16T12:55:00Z
9
value 0.00057
scoring_system epss
scoring_elements 0.17659
published_at 2026-04-18T12:55:00Z
10
value 0.00057
scoring_system epss
scoring_elements 0.17717
published_at 2026-04-01T12:55:00Z
11
value 0.00057
scoring_system epss
scoring_elements 0.17876
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-35904
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35904
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35904
2
reference_url https://github.com/crossbeam-rs/crossbeam
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/crossbeam-rs/crossbeam
3
reference_url https://github.com/crossbeam-rs/crossbeam/pull/533
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/crossbeam-rs/crossbeam/pull/533
4
reference_url https://nvd.nist.gov/vuln/detail/CVE-2020-35904
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2020-35904
5
reference_url https://rustsec.org/advisories/RUSTSEC-2020-0052.html
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://rustsec.org/advisories/RUSTSEC-2020-0052.html
6
reference_url https://github.com/advisories/GHSA-m8h8-v6jh-c762
reference_id GHSA-m8h8-v6jh-c762
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-m8h8-v6jh-c762
Weaknesses
0
cwe_id 131
name Incorrect Calculation of Buffer Size
description The product does not correctly calculate the size to be used when allocating a buffer, which could lead to a buffer overflow.
Exploits
Severity_range_score4.0 - 6.9
Exploitability0.5
Weighted_severity6.2
Risk_score3.1
Resource_urlhttp://public2.vulnerablecode.io/vulnerabilities/VCID-w377-ghca-5fff