Open mend-bolt-for-github[bot] opened 2 years ago
:heavy_check_mark: This issue was automatically closed by Mend because the vulnerable library in the specific branch(es) was either marked as ignored or it is no longer part of the Mend inventory.
:information_source: This issue was automatically re-opened by Mend because the vulnerable library in the specific branch(es) has been detected in the Mend inventory.
WS-2022-0049 - High Severity Vulnerability
Vulnerable Library - thread_local-1.1.0.crate
Per-object thread-local storage
Library home page: https://crates.io/api/v1/crates/thread_local/1.1.0/download
Path to dependency file: /packages/cactus-plugin-keychain-vault/src/cactus-keychain-vault-server/rust/gen/Cargo.toml
Path to vulnerable library: /packages/cactus-plugin-keychain-vault/src/cactus-keychain-vault-server/rust/gen/Cargo.toml
Dependency Hierarchy: - regex-1.4.3.crate (Root Library) - :x: **thread_local-1.1.0.crate** (Vulnerable Library)
Found in base branch: master
Vulnerability Details
In the affected version of this crate, {Iter, IterMut}::next used a weaker memory ordering when loading values than what was required, exposing a potential data race when iterating over a ThreadLocal's values. Crates using Iter::next, or IterMut::next are affected by this issue.
Publish Date: 2024-11-03
URL: WS-2022-0049
CVSS 3 Score Details (8.1)
Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High
For more information on CVSS3 Scores, click here.Suggested Fix
Type: Upgrade version
Origin: https://rustsec.org/advisories/RUSTSEC-2022-0006.html
Release Date: 2022-01-23
Fix Resolution: thread_local - 1.1.4
Step up your Open Source Security Game with Mend here