
Cloud Vulnerability DB
A community-led vulnerabilities database
The vulnerability (CVE-2018-25023) was discovered in the smallvec crate before version 0.6.13 for Rust. The issue involves the creation of uninitialized values of any type, including reference types, which is considered unsound in Rust's memory safety model (RustSec Advisory, MITRE CVE).
The vulnerability stems from the use of mem::uninitialized() to create values of user-supplied type T. This is particularly problematic when T is a reference type, as references in Rust must be non-null and cannot remain uninitialized. The issue has a CVSS 3 Severity Score of 7.5 (High), with network attack vector, low complexity, and no privileges required (Ubuntu Security).
The vulnerability could lead to memory corruption when dealing with reference types, potentially compromising the memory safety guarantees that Rust provides. The impact primarily affects integrity with no direct effect on confidentiality or availability (Ubuntu Security).
The vulnerability was fixed in smallvec version 0.6.13 by replacing the use of mem::uninitialized() with MaybeUninit. Users should upgrade to version 0.6.13 or later to address this security issue (RustSec Advisory, Rust Commit).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."