Bug 2143519 (CVE-2021-45710) - CVE-2021-45710 tokio: Race leads to panic in oneshot::Sender::send()
Summary: CVE-2021-45710 tokio: Race leads to panic in oneshot::Sender::send()
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2021-45710
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
low
low
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 2143522 2143523 2143524 2155128 2155129 2155130 2155131 2155132
Blocks: 2143421
TreeView+ depends on / blocked
 
Reported: 2022-11-17 04:39 UTC by Sandipan Roy
Modified: 2022-12-23 03:08 UTC (History)
8 users (show)

Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
A flaw was found in the tokio crate for Rust. In circumstances involving a closed oneshot channel, there is a data race and memory corruption issue.
Clone Of:
Environment:
Last Closed: 2022-12-22 07:39:02 UTC
Embargoed:


Attachments (Terms of Use)

Description Sandipan Roy 2022-11-17 04:39:27 UTC
An issue was discovered in the tokio crate before 1.8.4, and 1.9.x through 1.13.x before 1.13.1, for Rust. In certain circumstances involving a closed oneshot channel, there is a data race and memory corruption.

https://rustsec.org/advisories/RUSTSEC-2021-0124.html
https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/tokio/RUSTSEC-2021-0124.md

Comment 2 Sandipan Roy 2022-11-17 04:44:31 UTC
Created 389-ds-base tracking bugs for this issue:

Affects: fedora-all [bug 2143524]


Created aardvark-dns tracking bugs for this issue:

Affects: fedora-all [bug 2143522]


Created netavark tracking bugs for this issue:

Affects: fedora-all [bug 2143523]

Comment 3 Aditya R 2022-11-17 10:20:15 UTC
Hi Sandipan,

None of the aardvark/netavark is using `oneshot` directly but our deps could be using it but our tokio version is `1.21.2` which newer than the versions listed above. So I think `netavark` and `aardvark` are not affected by this.

Thanks
Aditya


Note You need to log in before you can comment on or make changes to this bug.