
Cloud Vulnerability DB
A community-led vulnerabilities database
An issue was discovered in the id-map crate through 2021-02-26 for Rust. Multiple functions in the crate can cause double-frees, including IdMap::clonefrom, getorinsert, and removeset. The vulnerability was assigned CVE-2021-30455 and was reported on February 26, 2021 (RustSec Advisory).
The vulnerability affects three main functions: 1) IdMap::clonefrom - A double free can occur upon a .clone panic after dropping values present in the map, 2) getorinsert - If the user-provided insertion function f panics after space reservation, it can lead to uninitialized or previously freed memory being dropped, 3) removeset - If a Drop implementation panics during ptr::dropinplace calls, previously dropped elements can be dropped again (RustSec Advisory).
The vulnerability can lead to memory corruption through double-free conditions, which could potentially result in undefined behavior or application crashes. This type of memory safety issue could be exploited to cause denial of service or potentially lead to arbitrary code execution (RustSec Advisory).
As of the advisory date, there are no patched versions available for this vulnerability. Users should avoid using the affected functions or ensure that operations that could panic are properly handled (RustSec Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."