RUSTSEC-2020-0062

Improper Sync implementation on FuturesUnordered in futures-utils can cause data corruption

Issued
Package
futures-util (crates.io)
Type
Vulnerability
Categories
  • memory-corruption
  • thread-safety
Aliases
Details
https://github.com/rust-lang/futures-rs/issues/2050
Patched
  • >=0.3.2
Unaffected
  • <0.3.0
Keywords
  • concurrency
  • memory-corruption
  • memory-management
Affected Functions
Version
futures_util::stream::FuturesUnordered
  • >=0.3.0

Description

Affected versions of the crate had an unsound Sync implementation on the FuturesUnordered structure, which used a Cell for interior mutability without any code to handle synchronized access to the underlying task list's length and head safely.

This could of lead to data corruption since two threads modifying the list at once could see incorrect values due to the lack of access synchronization.

The issue was fixed by adding access synchronization code around insertion of tasks into the list.

More