logo

CVE-2020-36469 appendix

Package

Manager: cargo
Name: appendix
Vulnerable Version: >=0 <=0.2.0

Severity

Level: Medium

CVSS v3.1: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H

CVSS v4.0: CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N

EPSS: 0.0028 pctl0.51006

Details

Data races in appendix The `appendix` crate implements a key-value mapping data structure called `Index<K, V>` that is stored on disk. The crate allows for any type to inhabit the generic `K` and `V` type parameters and implements Send and Sync for them unconditionally. Using a type that is not marked as `Send` or `Sync` with `Index` can allow it to be used across multiple threads leading to data races. Additionally using reference types for the keys or values will lead to the segmentation faults in the crate's code.

Metadata

Created: 2021-08-25T20:57:02Z
Modified: 2021-08-24T19:08:25Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2021/08/GHSA-fvhr-7j8m-3cvc/GHSA-fvhr-7j8m-3cvc.json
CWE IDs: ["CWE-362"]
Alternative ID: GHSA-fvhr-7j8m-3cvc
Finding: F124
Auto approve: 1