{"id":"RUSTSEC-2020-0098","summary":"UsbContext trait did not require implementers to be Send and Sync.","details":"Affected versions of `rusb` did not require `UsbContext` to implement `Send`\nand `Sync`. However, through `Device` and `DeviceHandle` it is possible to use\n`UsbContext`s across threads.\n\nThis issue allows non-thread safe `UsbContext` types to be used concurrently\nleading to data races and memory corruption.\n\nThe issue was fixed by adding `Send` and `Sync` bounds to `UsbContext`.","aliases":["CVE-2020-36206","GHSA-9mxw-4856-9cm5"],"modified":"2023-11-08T04:03:41.476758Z","published":"2020-12-18T12:00:00Z","database_specific":{"license":"CC0-1.0"},"references":[{"type":"PACKAGE","url":"https://crates.io/crates/rusb"},{"type":"ADVISORY","url":"https://rustsec.org/advisories/RUSTSEC-2020-0098.html"},{"type":"REPORT","url":"https://github.com/a1ien/rusb/issues/44"}],"affected":[{"package":{"name":"rusb","ecosystem":"crates.io","purl":"pkg:cargo/rusb"},"ranges":[{"type":"SEMVER","events":[{"introduced":"0.0.0-0"},{"fixed":"0.7.0"}]}],"ecosystem_specific":{"affects":{"os":[],"arch":[],"functions":[]},"affected_functions":null},"database_specific":{"informational":"unsound","categories":["memory-corruption","thread-safety"],"cvss":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H","source":"https://github.com/rustsec/advisory-db/blob/osv/crates/RUSTSEC-2020-0098.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}]}