CVE-2020-36214 – multiqueue2
Package
Manager: cargo
Name: multiqueue2
Vulnerable Version: >=0 <0.1.7
Severity
Level: Medium
CVSS v3.1: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
CVSS v4.0: CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
EPSS: 0.00389 pctl0.59205
Details
Data races in multiqueue2 Affected versions of this crate unconditionally implemented Send for types used in queue implementations (InnerSend<RW, T>, InnerRecv<RW, T>, FutInnerSend<RW, T>, FutInnerRecv<RW, T>). This allows users to send non-Send types to other threads, which can lead to data race bugs or other undefined behavior. The flaw was corrected in v0.1.7 by adding T: Send bound to to the Send impl of four data types explained above.
Metadata
Created: 2021-08-25T20:51:54Z
Modified: 2023-06-13T20:04:07Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2021/08/GHSA-jphw-p3m6-pj3c/GHSA-jphw-p3m6-pj3c.json
CWE IDs: ["CWE-662"]
Alternative ID: GHSA-jphw-p3m6-pj3c
Finding: F124
Auto approve: 1