
Cloud Vulnerability DB
A community-led vulnerabilities database
The vulnerability (GHSA-8gj8-hv75-gp94) affects the Rust crate 'crossbeam' versions prior to 0.7.0, specifically in its SegQueue implementation. The issue was discovered and disclosed in June 2022, where the implementation incorrectly used mem::zeroed() to create values of user-supplied types, which could lead to unsound behavior particularly when dealing with reference types that must be non-null (GitHub Advisory, RustSec Advisory).
The vulnerability stems from the usage of mem::zeroed() to create values of a user-supplied type T in the SegQueue implementation. This approach is particularly problematic when T is a reference type, as references in Rust must be non-null, making the zero initialization unsound. The issue was assigned a Moderate severity rating (GitHub Advisory).
When exploited, this vulnerability could lead to undefined behavior in Rust programs using the affected versions of crossbeam, particularly when working with reference types. The unsound initialization could potentially cause program crashes or unexpected behavior when dealing with reference types that require non-null values (RustSec Advisory).
The vulnerability was patched in version 0.7.0 of the crossbeam crate. The fix involved replacing the usage of mem::zeroed() with MaybeUninit, which provides a safe way to handle uninitialized memory. Users are advised to upgrade to version 0.7.0 or later to address this security issue (GitHub PR, RustSec Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."