This crate has no reviews yet. To add a review, set up your cargo-crev
.
Lib.rs has been able to verify that all files in the crate's tarball, except Cargo.lock
,
are in the crate's repository with a git tag matching the version. Please note that this check is still in beta, and absence of this confirmation does not mean that the files don't match.
Crates in the crates.io registry are tarball snapshots uploaded by crates' publishers. The registry is not using crates' git repositories, so there is a possibility that published crates have a misleading repository URL, or contain different code from the code in the repository.
To review the actual code of the crate, it's best to use cargo crev open noise_search
. Alternatively, you can download the tarball of noise_search v0.8.0 or view the source online.
Affected versions of this crate unconditionally implement Send/Sync for
MvccRwLock
. This can lead to data races when types that are either!Send
or!Sync
(e.g.Rc<T>
,Arc<Cell<_>>
) are contained insideMvccRwLock
and sent across thread boundaries. The data races can potentially lead to memory corruption (as demonstrated in the PoC from the original report issue).Also, safe APIs of
MvccRwLock
allow aliasing violations by allowing&T
andLockResult<MutexGuard<Box<T>>>
to co-exist in conflicting lifetime regions. The APIs ofMvccRwLock
should either be marked asunsafe
orMbccRwLock
should be changed to private or pub(crate).CVE-2020-36461
GHSA-wxjf-9f4g-3v44