Buffer Overflow Affecting v9 package, versions *


Severity

Recommended
0.0
medium
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.34% (57th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Buffer Overflow vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-RUST-V9-1759307
  • published17 Oct 2021
  • disclosed18 Dec 2020
  • creditUnknown

Introduced: 18 Dec 2020

CVE-2020-36447  (opens in a new tab)
CWE-119  (opens in a new tab)

How to fix?

There is no fixed version for v9.

Overview

v9 is a v9 is a clean, easy to use, and flexible data engine.

It provides a means to implement applications using Data Oriented Design.

Affected versions of this package are vulnerable to Buffer Overflow due to an unconditional implementation of Sync for SyncRef<T> which may allow data races if &T is accessible through &SyncRef.

It is possible to create data races & undefined behavior by concurrently invoking SyncRef<T>::clone() or SyncRef<T>::fmt() from multiple threads with T: !Sync.

CVSS Base Scores

version 3.1