This crate has no reviews yet. To add a review, set up your cargo-crev
.
Lib.rs has been able to verify that all files in the crate's tarball are in the crate's repository with a git tag matching the version. Please note that this check is still in beta, and absence of this confirmation does not mean that the files don't match.
Crates in the crates.io registry are tarball snapshots uploaded by crates' publishers. The registry is not using crates' git repositories, so there is a possibility that published crates have a misleading repository URL, or contain different code from the code in the repository.
To review the actual code of the crate, it's best to use cargo crev open rcu_cell
. Alternatively, you can download the tarball of rcu_cell v1.1.0 or view the source online.
Affected versions of this crate unconditionally implement Send/Sync for
RcuCell<T>
. This allows users to sendT: !Send
to other threads (whileT
enclosed withinRcuCell<T>
), and allows users to concurrently accessT: !Sync
by using the APIs ofRcuCell<T>
that provide access to&T
.This can result in memory corruption caused by data races.
CVE-2020-36451
GHSA-686h-j8r8-wmfm