CVE-2020-36439: Data races in ticketed_lock
(updated )
Affected versions of this crate unconditionally implemented Send for ReadTicket & WriteTicket. This allows to send non-Send T to other threads. This can allows creating data races by cloning types with internal mutability and sending them to other threads (as T of ReadTicket/WriteTicket). Such data races can cause memory corruption or other undefined behavior. The flaw was corrected in commit a986a93
by adding T: Send bounds to Send impls of ReadTicket/WriteTicket.
References
- github.com/advisories/GHSA-77m6-x95j-75r5
- github.com/kvark/ticketed_lock
- github.com/kvark/ticketed_lock/commit/a986a9335d591fa5c826157d1674d47aa525357f
- github.com/kvark/ticketed_lock/issues/7
- nvd.nist.gov/vuln/detail/CVE-2020-36439
- raw.githubusercontent.com/rustsec/advisory-db/main/crates/ticketed_lock/RUSTSEC-2020-0119.md
- rustsec.org/advisories/RUSTSEC-2020-0119.html
Detect and mitigate CVE-2020-36439 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →