GHSA-9mxw-4856-9cm5

Suggest an improvement
Source
https://github.com/advisories/GHSA-9mxw-4856-9cm5
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2021/08/GHSA-9mxw-4856-9cm5/GHSA-9mxw-4856-9cm5.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-9mxw-4856-9cm5
Aliases
Published
2021-08-25T20:50:51Z
Modified
2023-11-08T04:03:41.476758Z
Severity
  • 7.0 (High) CVSS_V3 - CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
Data races in rusb
Details

Affected versions of rusb did not require UsbContext to implement Send and Sync. However, through Device and DeviceHandle it is possible to use UsbContexts across threads. This issue allows non-thread safe UsbContext types to be used concurrently leading to data races and memory corruption. The issue was fixed by adding Send and Sync bounds to UsbContext.

Database specific
{
    "nvd_published_at": null,
    "cwe_ids": [
        "CWE-662",
        "CWE-787"
    ],
    "severity": "HIGH",
    "github_reviewed": true,
    "github_reviewed_at": "2021-08-19T18:51:05Z"
}
References

Affected packages

crates.io / rusb

Package

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.7.0