
Cloud Vulnerability DB
A community-led vulnerabilities database
An issue was discovered in the convec crate through 2020-11-24 for Rust, involving unconditional implementations of Send and Sync for ConVec. The vulnerability was assigned CVE-2020-36445 and was reported on November 24, 2020. This vulnerability affects all versions of the convec crate up to and including the last release on November 24, 2020 (RustSec Advisory).
The vulnerability stems from the unconditional implementation of Send and Sync traits for ConVec
The vulnerability enables the creation of data races in two ways: by using non-Send types like Arc> or Rc<> as T in ConVec, or by using types like Cell<_> or RefCell<> as T (types that are Send but not Sync). These data races can lead to memory corruption (RustSec Advisory).
As of the last available information, there are no patched versions available for this vulnerability (RustSec Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."