Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:deb/debian/rust-crossbeam-channel@0?distro=trixie
purl pkg:deb/debian/rust-crossbeam-channel@0?distro=trixie
Vulnerabilities affecting this package (0)
Vulnerability Summary Fixed by
This package is not known to be affected by vulnerabilities.
Vulnerabilities fixed by this package (2)
Vulnerability Summary Aliases
VCID-7vj2-6tfw-3fd4 crossbeam-channel Vulnerable to Double Free on Drop The internal `Channel` type's `Drop` method has a race which could, in some circumstances, lead to a double-free. This could result in memory corruption. Quoting from the [upstream description in merge request \#1187](https://github.com/crossbeam-rs/crossbeam/pull/1187#issue-2980761131): > The problem lies in the fact that `dicard_all_messages` contained two paths that could lead to `head.block` being read but only one of them would swap the value. This meant that `dicard_all_messages` could end up observing a non-null block pointer (and therefore attempting to free it) without setting `head.block` to null. This would then lead to `Channel::drop` making a second attempt at dropping the same pointer. The bug was introduced while fixing a memory leak, in upstream [MR \#1084](https://github.com/crossbeam-rs/crossbeam/pull/1084), first published in 0.5.12. The fix is in upstream [MR \#1187](https://github.com/crossbeam-rs/crossbeam/pull/1187) and has been published in 0.5.15 CVE-2025-4574
GHSA-pg9f-39pc-qf8g
VCID-unmm-942j-gkh7 crossbeam-channel Undefined Behavior before v0.4.4 ### Impact The affected version of this crate's the `bounded` channel incorrectly assumes that `Vec::from_iter` has allocated capacity that same as the number of iterator elements. `Vec::from_iter` does not actually guarantee that and may allocate extra memory. The destructor of the `bounded` channel reconstructs `Vec` from the raw pointer based on the incorrect assumes described above. This is unsound and causing deallocation with the incorrect capacity when `Vec::from_iter` has allocated different sizes with the number of iterator elements. ### Patches This has been fixed in crossbeam-channel 0.4.4. We recommend users to upgrade to 0.4.4. ### References See https://github.com/crossbeam-rs/crossbeam/pull/533, https://github.com/crossbeam-rs/crossbeam/issues/539, and https://github.com/RustSec/advisory-db/pull/425 for more details. ### License This advisory is in the public domain. CVE-2020-15254
GHSA-v5m7-53cv-f3hx

Date Actor Action Vulnerability Source VulnerableCode Version
2026-04-16T13:06:24.481384+00:00 Debian Importer Fixing VCID-unmm-942j-gkh7 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:13:46.841949+00:00 Debian Importer Fixing VCID-7vj2-6tfw-3fd4 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-13T09:00:45.838071+00:00 Debian Importer Fixing VCID-unmm-942j-gkh7 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:10:23.269476+00:00 Debian Importer Fixing VCID-7vj2-6tfw-3fd4 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-03T07:52:28.602913+00:00 Debian Importer Fixing VCID-7vj2-6tfw-3fd4 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:52:28.535514+00:00 Debian Importer Fixing VCID-unmm-942j-gkh7 https://security-tracker.debian.org/tracker/data/json 38.1.0