
Cloud Vulnerability DB
A community-led vulnerabilities database
The disrustor crate through version 2020-12-17 for Rust contains a critical vulnerability in its RingBuffer implementation. The vulnerability (CVE-2020-36470) involves improper handling of mutable references, where the RingBuffer type does not properly limit the number of mutable references, potentially leading to memory corruption and thread safety issues (RustSec Advisory, NVD).
The vulnerability stems from the RingBuffer type retrieving mutable references from the DataProvider in a non-atomic manner. Additionally, RingBuffer implements the Send and Sync traits for all types T without proper safeguards. The vulnerability has a CVSS v3.1 base score of 5.9 (Medium) with vector CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H, indicating network attack vector with high complexity, no privileges required, and high impact on availability (RustSec Advisory).
The vulnerability can lead to undefined behavior from aliased mutable references and potential data races. This primarily affects the availability of systems using the affected versions of the disrustor crate, with no direct impact on confidentiality or integrity (RustSec Advisory).
The vulnerability has been patched in version 0.3 and later of the disrustor crate. Users are advised to upgrade to the patched version to mitigate the risk (RustSec Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."