hello-world.rs
hello-world.rs copied to clipboard
WS-2022-0013 (High) detected in dashmap-4.0.2.crate
WS-2022-0013 - High Severity Vulnerability
Vulnerable Library - dashmap-4.0.2.crate
Blazing fast concurrent HashMap for Rust.
Library home page: https://crates.io/api/v1/crates/dashmap/4.0.2/download
Dependency Hierarchy:
- distill-0.0.3.crate (Root Library)
- distill-daemon-0.0.3.crate
- distill-loader-0.0.3.crate
- :x: dashmap-4.0.2.crate (Vulnerable Library)
- distill-loader-0.0.3.crate
- distill-daemon-0.0.3.crate
Found in base branch: master
Vulnerability Details
In dashmap package reference returned by some methods of Ref (and similar types) may outlive the Ref and escape the lock. This causes undefined behavior and may result in a segfault.
Publish Date: 2022-01-10
URL: WS-2022-0013
CVSS 3 Score Details (7.5)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
Suggested Fix
Type: Upgrade version
Origin: https://rustsec.org/advisories/RUSTSEC-2022-0002.html
Release Date: 2022-01-10
Fix Resolution: dashmap - 5.1.0
Step up your Open Source Security Game with Mend here