VYPR
High severityNVD Advisory· Published Aug 8, 2021· Updated Aug 4, 2024

CVE-2020-36448

CVE-2020-36448

Description

An issue was discovered in the cache crate through 2020-11-24 for Rust. There are unconditional implementations of Send and Sync for Cache.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

The Rust `cache` crate unconditionally implements `Send` and `Sync` for `Cache`, allowing safe Rust code to trigger undefined behavior and memory corruption.

Vulnerability

The cache crate (versions up to 2020-11-24) unconditionally implements the Send and Sync traits for Cache without requiring the key type K to be Send or Sync [1][2]. This violates Rust's safety guarantees because it allows a Cache to be sent across threads or shared via references even when K is not thread-safe, enabling data races and memory corruption.

Exploitation

An attacker does not need special network access; exploitation occurs when a developer uses the cache crate with a key type K that is not Send or Sync. By constructing a Cache with such a key and then sending it to another thread or sharing it, the attacker can trigger undefined behavior. The attack complexity is high because it requires the developer to use a non-thread-safe key type and the specific code path that transfers the cache across threads [2].

Impact

Successful exploitation can lead to memory corruption, data races, and potentially arbitrary code execution. The CVSS score is 8.1 (High) with impacts on confidentiality, integrity, and availability [2]. The attacker can achieve high impact on all three CIA pillars, but the attack complexity is high.

Mitigation

As of the advisory publication, there are no patched versions of the cache crate [2]. The crate appears to be unmaintained; users should avoid using it with non-thread-safe key types or migrate to an alternative caching library. No workaround is provided in the references.

AI Insight generated on May 21, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
cachecrates.io
<= 0.2.0

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

5

News mentions

0

No linked articles in our index yet.