hello-world.rs icon indicating copy to clipboard operation
hello-world.rs copied to clipboard

WS-2022-0013 (High) detected in dashmap-4.0.2.crate

Open mend-bolt-for-github[bot] opened this issue 3 years ago • 0 comments

WS-2022-0013 - High Severity Vulnerability

Vulnerable Library - dashmap-4.0.2.crate

Blazing fast concurrent HashMap for Rust.

Library home page: https://crates.io/api/v1/crates/dashmap/4.0.2/download

Dependency Hierarchy:

  • distill-0.0.3.crate (Root Library)
    • distill-daemon-0.0.3.crate
      • distill-loader-0.0.3.crate
        • :x: dashmap-4.0.2.crate (Vulnerable Library)

Found in base branch: master

Vulnerability Details

In dashmap package reference returned by some methods of Ref (and similar types) may outlive the Ref and escape the lock. This causes undefined behavior and may result in a segfault.

Publish Date: 2022-01-10

URL: WS-2022-0013

CVSS 3 Score Details (7.5)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: None
    • Integrity Impact: None
    • Availability Impact: High
For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://rustsec.org/advisories/RUSTSEC-2022-0002.html

Release Date: 2022-01-10

Fix Resolution: dashmap - 5.1.0


Step up your Open Source Security Game with Mend here