CVE-2020-36471 – generator
Package
Manager: cargo
Name: generator
Vulnerable Version: >=0 <0.7.0
Severity
Level: Medium
CVSS v3.1: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
CVSS v4.0: CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
EPSS: 0.0028 pctl0.51006
Details
Data races in generator The `Generator` type is an iterable which uses a generator function that yields values. In affected versions of the crate, the provided function yielding values had no `Send` bounds despite the `Generator` itself implementing `Send`. The generator function lacking a `Send` bound means that types that are dangerous to send across threads such as `Rc` could be sent as part of a generator, potentially leading to data races. This flaw was fixed in commit [`f7d120a3b`](https://github.com/Xudong-Huang/generator-rs/commit/f7d120a3b724d06a7b623d0a4306acf8f78cb4f0) by enforcing that the generator function be bound by `Send`.
Metadata
Created: 2021-08-25T20:57:05Z
Modified: 2021-08-24T18:04:25Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2021/08/GHSA-w3g5-2848-2v8r/GHSA-w3g5-2848-2v8r.json
CWE IDs: ["CWE-362"]
Alternative ID: GHSA-w3g5-2848-2v8r
Finding: F124
Auto approve: 1