Buffer Overflow Affecting v9 package, versions *


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.8% (82nd percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-RUST-V9-1759307
  • published17 Oct 2021
  • disclosed18 Dec 2020
  • creditUnknown

Introduced: 18 Dec 2020

CVE-2020-36447  (opens in a new tab)
CWE-119  (opens in a new tab)

How to fix?

There is no fixed version for v9.

Overview

v9 is a v9 is a clean, easy to use, and flexible data engine.

It provides a means to implement applications using Data Oriented Design.

Affected versions of this package are vulnerable to Buffer Overflow due to an unconditional implementation of Sync for SyncRef<T> which may allow data races if &T is accessible through &SyncRef.

It is possible to create data races & undefined behavior by concurrently invoking SyncRef<T>::clone() or SyncRef<T>::fmt() from multiple threads with T: !Sync.

CVSS Base Scores

version 3.1