Search for vulnerabilities
Vulnerability details: VCID-frqc-3ef7-aaaf
Vulnerability ID VCID-frqc-3ef7-aaaf
Aliases CVE-2021-32810
GHSA-pqqp-xmhj-wgcw
Summary crossbeam-deque is a package of work-stealing deques for building task schedulers when programming in Rust. In versions prior to 0.7.4 and 0.8.0, the result of the race condition is that one or more tasks in the worker queue can be popped twice instead of other tasks that are forgotten and never popped. If tasks are allocated on the heap, this can cause double free and a memory leak. If not, this still can cause a logical bug. Crates using `Stealer::steal`, `Stealer::steal_batch`, or `Stealer::steal_batch_and_pop` are affected by this issue. This has been fixed in crossbeam-deque 0.8.1 and 0.7.4.
Status Published
Exploitability 0.5
Weighted Severity 9.0
Risk 4.5
Affected and Fixed Packages Package Details
Weaknesses (2)
System Score Found at
generic_textual Medium http://people.canonical.com/~ubuntu-security/cve/2021/CVE-2021-32810.html
rhas Important https://access.redhat.com/errata/RHSA-2021:3755
rhas Important https://access.redhat.com/errata/RHSA-2021:3756
rhas Important https://access.redhat.com/errata/RHSA-2021:3757
rhas Important https://access.redhat.com/errata/RHSA-2021:3791
rhas Important https://access.redhat.com/errata/RHSA-2021:3838
rhas Important https://access.redhat.com/errata/RHSA-2021:3839
rhas Important https://access.redhat.com/errata/RHSA-2021:3840
rhas Important https://access.redhat.com/errata/RHSA-2021:3841
cvssv3 9.8 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-32810.json
epss 0.00888 https://api.first.org/data/v1/epss?cve=CVE-2021-32810
epss 0.00888 https://api.first.org/data/v1/epss?cve=CVE-2021-32810
epss 0.00888 https://api.first.org/data/v1/epss?cve=CVE-2021-32810
epss 0.00888 https://api.first.org/data/v1/epss?cve=CVE-2021-32810
epss 0.00888 https://api.first.org/data/v1/epss?cve=CVE-2021-32810
epss 0.00888 https://api.first.org/data/v1/epss?cve=CVE-2021-32810
epss 0.00888 https://api.first.org/data/v1/epss?cve=CVE-2021-32810
epss 0.00888 https://api.first.org/data/v1/epss?cve=CVE-2021-32810
epss 0.00888 https://api.first.org/data/v1/epss?cve=CVE-2021-32810
epss 0.00888 https://api.first.org/data/v1/epss?cve=CVE-2021-32810
epss 0.00888 https://api.first.org/data/v1/epss?cve=CVE-2021-32810
epss 0.00888 https://api.first.org/data/v1/epss?cve=CVE-2021-32810
epss 0.01051 https://api.first.org/data/v1/epss?cve=CVE-2021-32810
epss 0.01051 https://api.first.org/data/v1/epss?cve=CVE-2021-32810
epss 0.01051 https://api.first.org/data/v1/epss?cve=CVE-2021-32810
epss 0.01051 https://api.first.org/data/v1/epss?cve=CVE-2021-32810
epss 0.01051 https://api.first.org/data/v1/epss?cve=CVE-2021-32810
epss 0.01051 https://api.first.org/data/v1/epss?cve=CVE-2021-32810
epss 0.01051 https://api.first.org/data/v1/epss?cve=CVE-2021-32810
epss 0.01051 https://api.first.org/data/v1/epss?cve=CVE-2021-32810
epss 0.01051 https://api.first.org/data/v1/epss?cve=CVE-2021-32810
epss 0.01051 https://api.first.org/data/v1/epss?cve=CVE-2021-32810
epss 0.01051 https://api.first.org/data/v1/epss?cve=CVE-2021-32810
epss 0.01051 https://api.first.org/data/v1/epss?cve=CVE-2021-32810
epss 0.01051 https://api.first.org/data/v1/epss?cve=CVE-2021-32810
epss 0.01051 https://api.first.org/data/v1/epss?cve=CVE-2021-32810
epss 0.01051 https://api.first.org/data/v1/epss?cve=CVE-2021-32810
epss 0.01051 https://api.first.org/data/v1/epss?cve=CVE-2021-32810
epss 0.01051 https://api.first.org/data/v1/epss?cve=CVE-2021-32810
epss 0.01051 https://api.first.org/data/v1/epss?cve=CVE-2021-32810
epss 0.01051 https://api.first.org/data/v1/epss?cve=CVE-2021-32810
epss 0.01051 https://api.first.org/data/v1/epss?cve=CVE-2021-32810
epss 0.01051 https://api.first.org/data/v1/epss?cve=CVE-2021-32810
epss 0.01051 https://api.first.org/data/v1/epss?cve=CVE-2021-32810
epss 0.01051 https://api.first.org/data/v1/epss?cve=CVE-2021-32810
epss 0.01051 https://api.first.org/data/v1/epss?cve=CVE-2021-32810
epss 0.01051 https://api.first.org/data/v1/epss?cve=CVE-2021-32810
epss 0.01051 https://api.first.org/data/v1/epss?cve=CVE-2021-32810
epss 0.01051 https://api.first.org/data/v1/epss?cve=CVE-2021-32810
epss 0.01051 https://api.first.org/data/v1/epss?cve=CVE-2021-32810
epss 0.01051 https://api.first.org/data/v1/epss?cve=CVE-2021-32810
epss 0.01051 https://api.first.org/data/v1/epss?cve=CVE-2021-32810
epss 0.01051 https://api.first.org/data/v1/epss?cve=CVE-2021-32810
epss 0.01051 https://api.first.org/data/v1/epss?cve=CVE-2021-32810
epss 0.01051 https://api.first.org/data/v1/epss?cve=CVE-2021-32810
epss 0.01051 https://api.first.org/data/v1/epss?cve=CVE-2021-32810
epss 0.01051 https://api.first.org/data/v1/epss?cve=CVE-2021-32810
epss 0.01051 https://api.first.org/data/v1/epss?cve=CVE-2021-32810
epss 0.01051 https://api.first.org/data/v1/epss?cve=CVE-2021-32810
epss 0.01051 https://api.first.org/data/v1/epss?cve=CVE-2021-32810
epss 0.01051 https://api.first.org/data/v1/epss?cve=CVE-2021-32810
epss 0.01051 https://api.first.org/data/v1/epss?cve=CVE-2021-32810
epss 0.01051 https://api.first.org/data/v1/epss?cve=CVE-2021-32810
epss 0.01051 https://api.first.org/data/v1/epss?cve=CVE-2021-32810
epss 0.01051 https://api.first.org/data/v1/epss?cve=CVE-2021-32810
epss 0.01051 https://api.first.org/data/v1/epss?cve=CVE-2021-32810
epss 0.01051 https://api.first.org/data/v1/epss?cve=CVE-2021-32810
epss 0.01051 https://api.first.org/data/v1/epss?cve=CVE-2021-32810
epss 0.01051 https://api.first.org/data/v1/epss?cve=CVE-2021-32810
epss 0.01051 https://api.first.org/data/v1/epss?cve=CVE-2021-32810
epss 0.01051 https://api.first.org/data/v1/epss?cve=CVE-2021-32810
epss 0.01051 https://api.first.org/data/v1/epss?cve=CVE-2021-32810
epss 0.01051 https://api.first.org/data/v1/epss?cve=CVE-2021-32810
epss 0.01051 https://api.first.org/data/v1/epss?cve=CVE-2021-32810
epss 0.01051 https://api.first.org/data/v1/epss?cve=CVE-2021-32810
epss 0.01051 https://api.first.org/data/v1/epss?cve=CVE-2021-32810
epss 0.01051 https://api.first.org/data/v1/epss?cve=CVE-2021-32810
epss 0.01051 https://api.first.org/data/v1/epss?cve=CVE-2021-32810
epss 0.01051 https://api.first.org/data/v1/epss?cve=CVE-2021-32810
epss 0.01051 https://api.first.org/data/v1/epss?cve=CVE-2021-32810
epss 0.01051 https://api.first.org/data/v1/epss?cve=CVE-2021-32810
epss 0.01051 https://api.first.org/data/v1/epss?cve=CVE-2021-32810
epss 0.01051 https://api.first.org/data/v1/epss?cve=CVE-2021-32810
epss 0.01051 https://api.first.org/data/v1/epss?cve=CVE-2021-32810
epss 0.01051 https://api.first.org/data/v1/epss?cve=CVE-2021-32810
epss 0.01051 https://api.first.org/data/v1/epss?cve=CVE-2021-32810
epss 0.01152 https://api.first.org/data/v1/epss?cve=CVE-2021-32810
epss 0.01152 https://api.first.org/data/v1/epss?cve=CVE-2021-32810
epss 0.01152 https://api.first.org/data/v1/epss?cve=CVE-2021-32810
epss 0.01152 https://api.first.org/data/v1/epss?cve=CVE-2021-32810
epss 0.02219 https://api.first.org/data/v1/epss?cve=CVE-2021-32810
rhbs medium https://bugzilla.redhat.com/show_bug.cgi?id=1990342
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32810
cvssv3.1 9.8 https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
cvssv3.1_qr CRITICAL https://github.com/advisories/GHSA-pqqp-xmhj-wgcw
cvssv3.1 8.1 https://github.com/crossbeam-rs/crossbeam
generic_textual MODERATE https://github.com/crossbeam-rs/crossbeam
cvssv3.1 9.8 https://github.com/crossbeam-rs/crossbeam/security/advisories/GHSA-pqqp-xmhj-wgcw
generic_textual CRITICAL https://github.com/crossbeam-rs/crossbeam/security/advisories/GHSA-pqqp-xmhj-wgcw
cvssv3.1 9.8 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7EZILHZDRGDPOBQ4KTW3E5PPMKLHGH5N
generic_textual CRITICAL https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7EZILHZDRGDPOBQ4KTW3E5PPMKLHGH5N
cvssv3.1 9.8 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AWHNNBJCU4EHA2X5ZAMJMGLDUYS5FEPP
generic_textual CRITICAL https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AWHNNBJCU4EHA2X5ZAMJMGLDUYS5FEPP
cvssv3.1 9.8 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AYBSLIYFANZLCYWOGTIYZUM26TJRH7WU
generic_textual CRITICAL https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AYBSLIYFANZLCYWOGTIYZUM26TJRH7WU
cvssv3.1 9.8 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CY5T3FCE4MUYSPKEWICLVJBBODGJ6SZE
generic_textual CRITICAL https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CY5T3FCE4MUYSPKEWICLVJBBODGJ6SZE
cvssv3.1 9.8 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EW5B2VTDVMJ6B3DA4VLMAMW2GGDCE2BK
generic_textual CRITICAL https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EW5B2VTDVMJ6B3DA4VLMAMW2GGDCE2BK
cvssv3.1 9.8 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LCIBFGBSL3JSVJQTNEDEIMZGZF23N2KE
generic_textual CRITICAL https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LCIBFGBSL3JSVJQTNEDEIMZGZF23N2KE
cvssv3.1 9.8 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OCLMH7B7B2MF55ET4NQNPH7JWISFX4RT
generic_textual CRITICAL https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OCLMH7B7B2MF55ET4NQNPH7JWISFX4RT
cvssv3.1 9.8 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RRPKBRXCRNGNMVFQPFD4LM3QKPEMBQQR
generic_textual CRITICAL https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RRPKBRXCRNGNMVFQPFD4LM3QKPEMBQQR
cvssv3.1 9.8 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TFUBWBYCPSSXTJGEAQ67CJUNQJBOCM26
generic_textual CRITICAL https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TFUBWBYCPSSXTJGEAQ67CJUNQJBOCM26
cvssv3.1 9.8 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U3LSN3B43TJSFIOB3QLPBI3RCHRU5BLO
generic_textual CRITICAL https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U3LSN3B43TJSFIOB3QLPBI3RCHRU5BLO
cvssv3.1 9.8 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VQZIEJQBV3S72BHD5GKJQF3NVYNRV5CF
generic_textual CRITICAL https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VQZIEJQBV3S72BHD5GKJQF3NVYNRV5CF
cvssv3.1 9.8 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WGB2H35CTZDHOV3VLC5BM6VFGURLLVRP
generic_textual CRITICAL https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WGB2H35CTZDHOV3VLC5BM6VFGURLLVRP
cvssv3.1 9.8 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XFBZWCLG7AGLJO4A7K5IMJVPLSWZ5TJP
generic_textual CRITICAL https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XFBZWCLG7AGLJO4A7K5IMJVPLSWZ5TJP
cvssv3.1 9.8 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZQDIBB7VR3ER52FMSMNJPAWNDO5SITCE
generic_textual CRITICAL https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZQDIBB7VR3ER52FMSMNJPAWNDO5SITCE
cvssv2 6.8 https://nvd.nist.gov/vuln/detail/CVE-2021-32810
cvssv3 9.8 https://nvd.nist.gov/vuln/detail/CVE-2021-32810
cvssv3.1 9.8 https://nvd.nist.gov/vuln/detail/CVE-2021-32810
cvssv3.1 9.8 https://rustsec.org/advisories/RUSTSEC-2021-0093.html
generic_textual CRITICAL https://rustsec.org/advisories/RUSTSEC-2021-0093.html
archlinux High https://security.archlinux.org/AVG-2443
archlinux High https://security.archlinux.org/AVG-2459
generic_textual Medium https://ubuntu.com/security/notices/USN-5132-1
generic_textual high https://www.mozilla.org/en-US/security/advisories/mfsa2021-43
generic_textual Medium https://www.mozilla.org/en-US/security/advisories/mfsa2021-43/#CVE-2021-32810
generic_textual high https://www.mozilla.org/en-US/security/advisories/mfsa2021-45
generic_textual high https://www.mozilla.org/en-US/security/advisories/mfsa2021-47
Reference id Reference type URL
http://people.canonical.com/~ubuntu-security/cve/2021/CVE-2021-32810.html
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-32810.json
https://api.first.org/data/v1/epss?cve=CVE-2021-32810
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32810
https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
https://github.com/crossbeam-rs/crossbeam
https://github.com/crossbeam-rs/crossbeam/security/advisories/GHSA-pqqp-xmhj-wgcw
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7EZILHZDRGDPOBQ4KTW3E5PPMKLHGH5N/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AWHNNBJCU4EHA2X5ZAMJMGLDUYS5FEPP/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AYBSLIYFANZLCYWOGTIYZUM26TJRH7WU/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CY5T3FCE4MUYSPKEWICLVJBBODGJ6SZE/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EW5B2VTDVMJ6B3DA4VLMAMW2GGDCE2BK/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LCIBFGBSL3JSVJQTNEDEIMZGZF23N2KE/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OCLMH7B7B2MF55ET4NQNPH7JWISFX4RT/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RRPKBRXCRNGNMVFQPFD4LM3QKPEMBQQR/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TFUBWBYCPSSXTJGEAQ67CJUNQJBOCM26/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U3LSN3B43TJSFIOB3QLPBI3RCHRU5BLO/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VQZIEJQBV3S72BHD5GKJQF3NVYNRV5CF/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WGB2H35CTZDHOV3VLC5BM6VFGURLLVRP/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XFBZWCLG7AGLJO4A7K5IMJVPLSWZ5TJP/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZQDIBB7VR3ER52FMSMNJPAWNDO5SITCE/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7EZILHZDRGDPOBQ4KTW3E5PPMKLHGH5N
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7EZILHZDRGDPOBQ4KTW3E5PPMKLHGH5N/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AWHNNBJCU4EHA2X5ZAMJMGLDUYS5FEPP
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AWHNNBJCU4EHA2X5ZAMJMGLDUYS5FEPP/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AYBSLIYFANZLCYWOGTIYZUM26TJRH7WU
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AYBSLIYFANZLCYWOGTIYZUM26TJRH7WU/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CY5T3FCE4MUYSPKEWICLVJBBODGJ6SZE
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CY5T3FCE4MUYSPKEWICLVJBBODGJ6SZE/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EW5B2VTDVMJ6B3DA4VLMAMW2GGDCE2BK
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EW5B2VTDVMJ6B3DA4VLMAMW2GGDCE2BK/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LCIBFGBSL3JSVJQTNEDEIMZGZF23N2KE
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LCIBFGBSL3JSVJQTNEDEIMZGZF23N2KE/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OCLMH7B7B2MF55ET4NQNPH7JWISFX4RT
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OCLMH7B7B2MF55ET4NQNPH7JWISFX4RT/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RRPKBRXCRNGNMVFQPFD4LM3QKPEMBQQR
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RRPKBRXCRNGNMVFQPFD4LM3QKPEMBQQR/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TFUBWBYCPSSXTJGEAQ67CJUNQJBOCM26
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TFUBWBYCPSSXTJGEAQ67CJUNQJBOCM26/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U3LSN3B43TJSFIOB3QLPBI3RCHRU5BLO
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U3LSN3B43TJSFIOB3QLPBI3RCHRU5BLO/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VQZIEJQBV3S72BHD5GKJQF3NVYNRV5CF
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VQZIEJQBV3S72BHD5GKJQF3NVYNRV5CF/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WGB2H35CTZDHOV3VLC5BM6VFGURLLVRP
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WGB2H35CTZDHOV3VLC5BM6VFGURLLVRP/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XFBZWCLG7AGLJO4A7K5IMJVPLSWZ5TJP
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XFBZWCLG7AGLJO4A7K5IMJVPLSWZ5TJP/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZQDIBB7VR3ER52FMSMNJPAWNDO5SITCE
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZQDIBB7VR3ER52FMSMNJPAWNDO5SITCE/
https://rustsec.org/advisories/RUSTSEC-2021-0093.html
https://ubuntu.com/security/notices/USN-5132-1
https://www.mozilla.org/en-US/security/advisories/mfsa2021-43/#CVE-2021-32810
1990342 https://bugzilla.redhat.com/show_bug.cgi?id=1990342
993146 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=993146
AVG-2443 https://security.archlinux.org/AVG-2443
AVG-2459 https://security.archlinux.org/AVG-2459
cpe:2.3:a:crossbeam_project:crossbeam:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:crossbeam_project:crossbeam:*:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*
CVE-2021-32810 https://nvd.nist.gov/vuln/detail/CVE-2021-32810
GHSA-pqqp-xmhj-wgcw https://github.com/advisories/GHSA-pqqp-xmhj-wgcw
mfsa2021-43 https://www.mozilla.org/en-US/security/advisories/mfsa2021-43
mfsa2021-45 https://www.mozilla.org/en-US/security/advisories/mfsa2021-45
mfsa2021-47 https://www.mozilla.org/en-US/security/advisories/mfsa2021-47
RHSA-2021:3755 https://access.redhat.com/errata/RHSA-2021:3755
RHSA-2021:3756 https://access.redhat.com/errata/RHSA-2021:3756
RHSA-2021:3757 https://access.redhat.com/errata/RHSA-2021:3757
RHSA-2021:3791 https://access.redhat.com/errata/RHSA-2021:3791
RHSA-2021:3838 https://access.redhat.com/errata/RHSA-2021:3838
RHSA-2021:3839 https://access.redhat.com/errata/RHSA-2021:3839
RHSA-2021:3840 https://access.redhat.com/errata/RHSA-2021:3840
RHSA-2021:3841 https://access.redhat.com/errata/RHSA-2021:3841
USN-5107-1 https://usn.ubuntu.com/5107-1/
USN-5132-1 https://usn.ubuntu.com/5132-1/
No exploits are available.
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-32810.json
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://github.com/crossbeam-rs/crossbeam
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://github.com/crossbeam-rs/crossbeam/security/advisories/GHSA-pqqp-xmhj-wgcw
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7EZILHZDRGDPOBQ4KTW3E5PPMKLHGH5N
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AWHNNBJCU4EHA2X5ZAMJMGLDUYS5FEPP
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AYBSLIYFANZLCYWOGTIYZUM26TJRH7WU
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CY5T3FCE4MUYSPKEWICLVJBBODGJ6SZE
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EW5B2VTDVMJ6B3DA4VLMAMW2GGDCE2BK
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LCIBFGBSL3JSVJQTNEDEIMZGZF23N2KE
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OCLMH7B7B2MF55ET4NQNPH7JWISFX4RT
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RRPKBRXCRNGNMVFQPFD4LM3QKPEMBQQR
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TFUBWBYCPSSXTJGEAQ67CJUNQJBOCM26
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U3LSN3B43TJSFIOB3QLPBI3RCHRU5BLO
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VQZIEJQBV3S72BHD5GKJQF3NVYNRV5CF
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WGB2H35CTZDHOV3VLC5BM6VFGURLLVRP
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XFBZWCLG7AGLJO4A7K5IMJVPLSWZ5TJP
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZQDIBB7VR3ER52FMSMNJPAWNDO5SITCE
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P Found at https://nvd.nist.gov/vuln/detail/CVE-2021-32810
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://nvd.nist.gov/vuln/detail/CVE-2021-32810
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://nvd.nist.gov/vuln/detail/CVE-2021-32810
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://rustsec.org/advisories/RUSTSEC-2021-0093.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.83030
EPSS Score 0.00888
Published At Nov. 1, 2024, midnight
Date Actor Action Source VulnerableCode Version
There are no relevant records.