CVE-2022-23639

CVSS V2 Medium 6.8 CVSS V3 High 8.1
Description
crossbeam-utils provides atomics, synchronization primitives, scoped threads, and other utilities for concurrent programming in Rust. crossbeam-utils prior to version 0.8.7 incorrectly assumed that the alignment of `{i,u}64` was always the same as `Atomic{I,U}64`. However, the alignment of `{i,u}64` on a 32-bit target can be smaller than `Atomic{I,U}64`. This can cause unaligned memory accesses and data race. Crates using `fetch_*` methods with `AtomicCell<{i,u}64>` are affected by this issue. 32-bit targets without `Atomic{I,U}64` and 64-bit targets are not affected by this issue. This has been fixed in crossbeam-utils 0.8.7. There are currently no known workarounds.
Overview
  • CVE ID
  • CVE-2022-23639
  • Assigner
  • security-advisories@github.com
  • Vulnerability Status
  • Analyzed
  • Published Version
  • 2022-02-15T19:15:08
  • Last Modified Date
  • 2023-02-10T16:28:40
CPE Configuration (Product)
CPE Vulnerable Operator Version Start Version End
cpe:2.3:a:crossbeam_project:crossbeam:*:*:*:*:*:rust:*:* 1 OR 0.8.7
CVSS Version 2
  • Version
  • 2.0
  • Vector String
  • AV:N/AC:M/Au:N/C:P/I:P/A:P
  • Access Vector
  • NETWORK
  • Access Compatibility
  • MEDIUM
  • Authentication
  • NONE
  • Confidentiality Impact
  • PARTIAL
  • Integrity Impact
  • PARTIAL
  • Availability Impact
  • PARTIAL
  • Base Score
  • 6.8
  • Severity
  • MEDIUM
  • Exploitability Score
  • 8.6
  • Impact Score
  • 6.4
CVSS Version 3
  • Version
  • 3.1
  • Vector String
  • CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
  • Attack Vector
  • NETWORK
  • Attack Compatibility
  • HIGH
  • Privileges Required
  • NONE
  • User Interaction
  • NONE
  • Scope
  • UNCHANGED
  • Confidentiality Impact
  • HIGH
  • Availability Impact
  • HIGH
  • Base Score
  • 8.1
  • Base Severity
  • HIGH
  • Exploitability Score
  • 2.2
  • Impact Score
  • 5.9
References
History
Created Old Value New Value Data Type Notes
2022-05-10 15:48:36 Added to TrackCVE
2022-12-06 09:52:12 2022-02-15T19:15Z 2022-02-15T19:15:08 CVE Published Date updated
2022-12-06 09:52:12 2022-06-09T16:15:08 CVE Modified Date updated
2022-12-06 09:52:12 Undergoing Analysis Vulnerability Status updated
2023-02-11 03:15:00 2023-02-10T16:28:40 CVE Modified Date updated
2023-02-11 03:15:00 Undergoing Analysis Analyzed Vulnerability Status updated
2023-02-11 03:15:01 Weakness Enumeration update