An Input<R> issue in eventio crate in Rust before 0.5.1 allows data race and memory corruption
Reporter | Title | Published | Views | Family All 8 |
---|---|---|---|---|
![]() | Soundness issue: Input<R> can be misused to create data race to an object | 20 Dec 202012:00 | – | rustsec |
![]() | Data race in eventio | 25 Aug 202120:51 | – | osv |
![]() | Soundness issue: Input<R> can be misused to create data race to an object | 20 Dec 202012:00 | – | osv |
![]() | CVE-2020-36216 | 22 Jan 202109:04 | – | cvelist |
![]() | Memory corruption | 26 Jan 202118:15 | – | prion |
![]() | CVE-2020-36216 | 26 Jan 202118:15 | – | nvd |
![]() | Data race in eventio | 25 Aug 202120:51 | – | github |
![]() | Mozilla Rust Memory Corruption Vulnerability (CNVD-2021-71658) | 8 Sep 202100:00 | – | cnvd |
Source | Link |
---|---|
rustsec | www.rustsec.org/advisories/RUSTSEC-2020-0108.html |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo