-
CVSS Score
-The advisory explicitly names {Iter, IterMut}::next as vulnerable due to using weaker memory ordering (Acquire) than required. The GitHub issue shows Miri detecting a data race in RawIter::next's AtomicBool load, which is called by these iterators. While the immediate issue is in RawIter, the exposed vulnerable interfaces are Iter::next and IterMut::next as they're the public API endpoints. The core problem is insufficient memory ordering guarantees when accessing shared atomic state during iteration.
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| thread_local | rust | < 1.1.4 | 1.1.4 |