
Cloud Vulnerability DB
A community-led vulnerabilities database
An issue was discovered in the libsbc crate before 0.1.5 for Rust. The vulnerability relates to the Decoder implementation, where it incorrectly implements Send for any R: Read, potentially leading to unsafe thread operations (RustSec Advisory).
The vulnerability stems from the Decoder implementation that allows Decoder to contain R: !Send and move it to another thread. This implementation flaw could result in undefined behavior, such as memory corruption from data races on R, or incorrectly dropping MutexGuard from a thread that didn't lock the mutex. The issue has a CVSS score of 8.1 (High) with vector CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H (RustSec Advisory).
The vulnerability can lead to memory corruption, thread safety issues, and undefined behavior in applications using the affected versions of the libsbc crate. This could potentially result in application crashes or other memory-related security issues (RustSec Advisory).
The vulnerability was fixed in version 0.1.5 of the libsbc crate by adding the trait bound R: Send to the Send implementation for Decoder. Users should upgrade to version 0.1.5 or later to address this security issue (RustSec Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."