logo

CVE-2020-36206 rusb

Package

Manager: cargo
Name: rusb
Vulnerable Version: >=0 <0.7.0

Severity

Level: High

CVSS v3.1: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H

CVSS v4.0: CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

EPSS: 0.00068 pctl0.21268

Details

Data races in rusb Affected versions of rusb did not require UsbContext to implement Send and Sync. However, through Device and DeviceHandle it is possible to use UsbContexts across threads. This issue allows non-thread safe UsbContext types to be used concurrently leading to data races and memory corruption. The issue was fixed by adding Send and Sync bounds to UsbContext.

Metadata

Created: 2021-08-25T20:50:51Z
Modified: 2023-06-13T20:46:48Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2021/08/GHSA-9mxw-4856-9cm5/GHSA-9mxw-4856-9cm5.json
CWE IDs: ["CWE-662", "CWE-787"]
Alternative ID: GHSA-9mxw-4856-9cm5
Finding: F124
Auto approve: 1