
Cloud Vulnerability DB
A community-led vulnerabilities database
The vulnerability (GHSA-3hxh-7jxm-59x4) affects the metrics-util Rust crate, where AtomicBucket
The vulnerability stems from the AtomicBucket struct unconditionally implementing Send/Sync traits through its contained Block data type. This implementation allows users to create data races to the inner T: !Sync by utilizing the AtomicBucket::data_with() API. The issue was identified in the struct Block implementation, which unconditionally implemented Send and Sync traits without appropriate bounds (GitHub Issue).
The vulnerability can lead to memory corruption or other undefined behavior due to potential data races. When exploited, it allows users to create concurrent access to &T from multiple threads for types that are not thread-safe (!Sync), and enables sending non-sendable types (!Send) to other threads (RustSec Advisory).
The vulnerability was fixed in version 0.7.0 of the metrics-util crate. The fix was implemented in commit 8e6daab by adding appropriate Send/Sync bounds to the Send/Sync implementation of struct Block contained inside AtomicBucket (RustSec Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."