
Cloud Vulnerability DB
A community-led vulnerabilities database
A critical vulnerability was discovered in the cache crate for Rust, tracked as CVE-2020-36448. The issue was identified on November 24, 2020, affecting all versions through that date. The vulnerability stems from unconditional implementations of Send and Sync traits for Cache
The vulnerability arises from the cache crate's implementation that unconditionally implements Send/Sync for Cache
The vulnerability enables the creation of data races through multiple vectors: using non-Send types like Arc> or Rc as K in Cache, or by utilizing types like Cell or RefCell that are Send but not Sync. These data races can potentially lead to memory corruption in affected applications (RustSec Advisory).
As of the advisory publication, no patched versions are available for this vulnerability. Users of the cache crate should carefully review their usage of Cache
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."