CVE-2020-36469 – appendix
Package
Manager: cargo
Name: appendix
Vulnerable Version: >=0 <=0.2.0
Severity
Level: Medium
CVSS v3.1: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
CVSS v4.0: CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
EPSS: 0.0028 pctl0.51006
Details
Data races in appendix The `appendix` crate implements a key-value mapping data structure called `Index<K, V>` that is stored on disk. The crate allows for any type to inhabit the generic `K` and `V` type parameters and implements Send and Sync for them unconditionally. Using a type that is not marked as `Send` or `Sync` with `Index` can allow it to be used across multiple threads leading to data races. Additionally using reference types for the keys or values will lead to the segmentation faults in the crate's code.
Metadata
Created: 2021-08-25T20:57:02Z
Modified: 2021-08-24T19:08:25Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2021/08/GHSA-fvhr-7j8m-3cvc/GHSA-fvhr-7j8m-3cvc.json
CWE IDs: ["CWE-362"]
Alternative ID: GHSA-fvhr-7j8m-3cvc
Finding: F124
Auto approve: 1