
Cloud Vulnerability DB
A community-led vulnerabilities database
An issue was discovered in the cgc crate through 2020-12-10 for Rust. The vulnerability, identified as CVE-2020-36468, involves the Ptr::write functionality which performs non-atomic write operations on an underlying pointer. This vulnerability was reported on December 10, 2020, and affects all versions of the cgc crate with no patched versions available (RustSec Advisory).
The vulnerability stems from multiple soundness issues in the Ptr implementation. Specifically, Ptr::write performs non-atomic write operations on the underlying pointer, which can lead to data races when used across threads. The vulnerability has been assigned a CVSS score of 5.9 (Medium) with the vector CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H (RustSec Advisory).
The vulnerability can lead to data races when the affected code is used across threads, potentially resulting in memory corruption and high availability impact. The CVSS scoring indicates no impact on confidentiality or integrity, but a high impact on availability (RustSec Advisory).
As of the latest reports, there are no patched versions available for this vulnerability. Users of the cgc crate should consider alternative implementations or carefully evaluate their usage of the Ptr::write functionality, especially in multi-threaded contexts (RustSec Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."