
Cloud Vulnerability DB
A community-led vulnerabilities database
An issue was discovered in the anymap crate through 0.12.1 for Rust. It violates soundness via conversion of a *u8 to a *u64 (NVD). The vulnerability was reported on May 7, 2021, and affects all versions up to and including 0.12.1 of the anymap crate.
The vulnerability is related to an incorrect conversion between numeric types (CWE-681), specifically involving the conversion of a *u8 pointer to a *u64 pointer. The issue has been assigned a CVSS v3.1 base score of 9.8 CRITICAL (Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) (NVD).
The vulnerability represents a critical security risk as it violates memory safety guarantees in Rust, potentially leading to memory corruption and arbitrary code execution. The high CVSS score indicates severe potential impacts on confidentiality, integrity, and availability of affected systems (NVD).
While a fix has been created and merged into the repository, it has never been released as the crate appears to be unmaintained. Users should consider migrating to alternative solutions as there are no official patches available (RustSec Advisory).
The crate has been officially marked as unmaintained in the RustSec Advisory Database, indicating that the security community has acknowledged the abandoned state of the project (RustSec Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."