VYPR
High severityNVD Advisory· Published Sep 19, 2020· Updated Aug 4, 2024

CVE-2020-25794

CVE-2020-25794

Description

An issue was discovered in the sized-chunks crate through 0.6.2 for Rust. In the Chunk implementation, clone can have a memory-safety issue upon a panic.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

In sized-chunks crate ≤0.6.2, Chunk's clone method is not panic-safe, leading to memory safety issues when a panic occurs during cloning.

Vulnerability

Overview

CVE-2020-25794 affects the sized-chunks crate for Rust, versions up to and including 0.6.2. The issue lies in the Chunk implementation's clone method, which is not panic-safe. If a panic occurs during the cloning process—for example, when cloning an element whose Clone implementation panics—the internal state of the Chunk can become inconsistent, leading to memory safety violations [1][2]. This is a classic soundness bug in unsafe Rust code, where invariants assumed by the unsafe blocks are not upheld in the presence of panics.

Exploitation

Conditions

Exploitation requires an attacker to control the data being cloned into a Chunk such that a panic is triggered during the clone operation. This can be achieved by providing a custom type with a Clone implementation that panics under specific conditions (e.g., when a certain field value is encountered). The attacker must also be able to influence the program to clone a Chunk containing such elements. No special network position or authentication is needed if the attacker can supply data to the application [1][3].

Impact

A successful exploit can result in memory corruption, including use-after-free or double-free conditions. In the context of a Rust program, this can lead to undefined behavior, potentially allowing an attacker to achieve arbitrary code execution or cause a denial of service. The RustSec advisory rates this vulnerability as HIGH severity with a CVSS score of 7.5 [3].

Mitigation

Status

The sized-chunks repository has been archived by the owner and is read-only [4]. No patched version has been released for this issue. Users of the crate are advised to avoid using the affected Chunk type or to switch to alternative implementations that provide similar functionality with proper panic safety. The RustSec advisory recommends migrating away from the crate entirely [3].

AI Insight generated on May 21, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
sized-chunkscrates.io
< 0.6.30.6.3

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

4

News mentions

0

No linked articles in our index yet.