From 9b16ec3e597e358cc8cb6984a98b16d875278af0 Mon Sep 17 00:00:00 2001 From: JOE1994 Date: Mon, 25 Jan 2021 17:49:23 -0500 Subject: [PATCH] Report 0039-rcu_cell to RustSec --- crates/rcu_cell/RUSTSEC-0000-0000.md | 18 ++++++++++++++++++ 1 file changed, 18 insertions(+) create mode 100644 crates/rcu_cell/RUSTSEC-0000-0000.md diff --git a/crates/rcu_cell/RUSTSEC-0000-0000.md b/crates/rcu_cell/RUSTSEC-0000-0000.md new file mode 100644 index 0000000..bc046a9 --- /dev/null +++ b/crates/rcu_cell/RUSTSEC-0000-0000.md @@ -0,0 +1,18 @@ +```toml +[advisory] +id = "RUSTSEC-0000-0000" +package = "rcu_cell" +date = "2020-11-14" +url = "https://github.com/Xudong-Huang/rcu_cell/issues/3" +categories = ["memory-corruption"] + +[versions] +patched = [] +``` + +# Send/Sync bound needed on T for Send/Sync impl of RcuCell + +Affected versions of this crate unconditionally implement Send/Sync for `RcuCell`. +This allows users to send `T: !Send` to other threads (while `T` enclosed within `RcuCell`), and allows users to concurrently access `T: !Sync` by using the APIs of `RcuCell` that provide access to `&T`. + +This can result in memory corruption caused by data races.