
Cloud Vulnerability DB
A community-led vulnerabilities database
An issue was discovered in the actix-web crate before version 0.7.15 for Rust. The vulnerability involves unsoundly extending the lifetime of a string, which could lead to memory corruption (RustSec Advisory).
The vulnerability is part of multiple memory safety issues in actix-web that include unsoundly extending lifetimes of strings, unsoundly coercing immutable references to mutable references, and incorrectly adding the Send marker trait to objects that cannot be safely sent between threads. These issues could result in various memory corruption scenarios, with use-after-free being the most likely outcome (RustSec Advisory).
The vulnerability can lead to memory corruption, potentially resulting in use-after-free scenarios. This could affect the stability and security of applications using the affected versions of actix-web (RustSec Advisory).
The vulnerability has been patched in actix-web version 0.7.15 and later. Users should upgrade to the patched version to resolve these memory safety issues. A significant refactoring effort was conducted to address these problems (RustSec Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."