
Cloud Vulnerability DB
A community-led vulnerabilities database
An issue was discovered in the rcu_cell crate through 2020-11-14 for Rust. The vulnerability stems from unconditional implementations of Send and Sync for RcuCell, which could lead to unsafe thread operations. This vulnerability has been assigned CVE-2020-36451 and has a CVSS v3.1 base score of 8.1 (HIGH) (RustSec Advisory).
The vulnerability exists because affected versions of the crate unconditionally implement Send/Sync for RcuCell without proper bounds checking on type T. This implementation allows users to send T: !Send to other threads while T is enclosed within RcuCell, and enables concurrent access to T: !Sync through RcuCell's APIs that provide access to &T (RustSec Advisory).
The vulnerability can result in memory corruption caused by data races when improperly handling thread-unsafe types. The CVSS score of 8.1 indicates high potential impact on confidentiality, integrity, and availability of affected systems (RustSec Advisory).
As of the advisory date, no patched versions are available. Users of the rcu_cell crate should implement their own bounds checking for Send and Sync traits or consider alternative implementations that properly handle thread safety (RustSec Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."