
Cloud Vulnerability DB
A community-led vulnerabilities database
An issue was discovered in the rcu_cell crate through 2020-11-14 for Rust programming language. The vulnerability involves unconditional implementations of Send and Sync for RcuCell, which could potentially lead to unsafe concurrent access patterns. The vulnerability was assigned identifier RUSTSEC-2021-0131 and received a CVSS v3.1 base score of 8.1 (HIGH) (NVD).
The vulnerability has been assessed with a CVSS v3.1 Base Score of 8.1 (HIGH) with the vector string CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H. The vulnerability is related to improper neutralization of special elements, categorized under CWE-77. The technical nature of the issue stems from the unconditional implementations of Send and Sync traits for RcuCell, which could potentially lead to unsafe concurrent access patterns in Rust applications (NVD).
The vulnerability could potentially lead to high impacts on confidentiality, integrity, and availability of affected systems as indicated by the CVSS score. The network vector (AV:N) suggests that the vulnerability is exploitable remotely, although it requires high attack complexity (AC:H) to exploit (NVD).
The vulnerability affects rcu_cell crate versions up to and including 2020-11-14. Users should update to a patched version if available (NVD).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."