
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2022-23639 affects crossbeam-utils versions prior to 0.8.7, where the crate incorrectly assumed that the alignment of {i,u}64 was always the same as Atomic{I,U}64. The vulnerability was discovered in February 2022 and affects 32-bit targets that support Atomic{I,U}64 operations (GitHub Advisory).
The vulnerability stems from an incorrect assumption about memory alignment where the alignment of {i,u}64 on a 32-bit target can be smaller than Atomic{I,U}64. This misalignment can lead to unaligned memory accesses and potential data races. The issue specifically affects crates using fetch_* methods with AtomicCell<{i,u}64>. The vulnerability has been assigned a High severity rating and affects multiple 32-bit targets including i586-unknown-linux-gnu, i686-linux-android, and various other 32-bit platforms (GitHub Advisory).
The vulnerability can result in unaligned memory accesses and data races on affected systems. This primarily impacts applications running on 32-bit targets that support Atomic{I,U}64 operations. It's worth noting that 32-bit targets without Atomic{I,U}64 and 64-bit targets are not affected by this issue (GitHub Advisory).
The vulnerability has been fixed in crossbeam-utils version 0.8.7. All affected 0.8.x releases prior to this version have been yanked from the registry. Users are advised to upgrade to version 0.8.7 or later to address this security issue (GitHub Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."