Race Condition Affecting async-coap package, versions *


Severity

Recommended
0.0
high
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.34% (56th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Race Condition vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-RUST-ASYNCCOAP-1315687
  • published1 Jul 2021
  • disclosed8 Dec 2020
  • creditUnknown

Introduced: 8 Dec 2020

CVE-2020-36444  (opens in a new tab)
CWE-362  (opens in a new tab)

How to fix?

A fix was pushed into the master branch but not yet published.

Overview

async-coap is an experimental, asynchronous Rust library for using and serving Constrained Application Protocol (CoAP) resources.

Affected versions of this package are vulnerable to Race Condition. This crate implements Send/Sync for ArcGuard<RC, T> with no trait bounds on RC. This allows users to send RC: !Send to other threads and also allows users to concurrently access Rc: !Sync from multiple threads. This can result in memory corruption from data race or other undefined behavior caused by sending T: !Send to other threads (e.g. dropping MutexGuard<T> in another thread that didn't lock its mutex).

CVSS Base Scores

version 3.1