CVE-2020-36437: Data race in conqueue
(updated )
Affected versions of this crate unconditionally implemented Send
/Sync
for QueueSender<T>
, allowing to send non-Send T
to other threads by invoking (&QueueSender<T>).send()
.
This fails to prevent users from creating data races by sending types like Rc<T>
or Arc<Cell<T>>
to other threads, which can lead to memory corruption. The flaw was corrected in commit 1e462c3
by imposing T: Send
to both Send
/Sync
impls for QueueSender<T>
/QueueReceiver<T>
.
References
- github.com/advisories/GHSA-368f-29c3-4f2r
- github.com/longshorej/conqueue
- github.com/longshorej/conqueue/commit/1e462c32e7933821ddb26dc49fd4ffa5aeca97b8
- nvd.nist.gov/vuln/detail/CVE-2020-36437
- raw.githubusercontent.com/rustsec/advisory-db/main/crates/conqueue/RUSTSEC-2020-0117.md
- rustsec.org/advisories/RUSTSEC-2020-0117.html
Detect and mitigate CVE-2020-36437 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →