Vulnerability DatabaseGHSA-p75v-367r-2v23

GHSA-p75v-367r-2v23
Rust vulnerability analysis and mitigation

Overview

The cell-project crate contained a critical vulnerability related to incorrect variance when projecting through &Cell<T>. The issue was discovered in versions prior to 0.1.4 and was fixed in version 0.1.4. The vulnerability stemmed from the cell_project macro's implementation which incorrectly used field as *const _ instead of field as *mut _, leading to unsound behavior due to relaxed variance constraints (GitHub Advisory, RustSec Advisory).

Technical details

The technical issue arose because *const T is covariant in T while *mut T is invariant in T. Since &Cell is invariant in T, casting to *const T incorrectly relaxed the variance, resulting in undefined behavior. This was particularly problematic when dealing with self-referential types and Drop implementations. The issue was confirmed through MIRI testing, which revealed undefined behavior related to memory access and tag protection violations (GitHub Issue).

Impact

The vulnerability could lead to memory corruption and undefined behavior in Rust programs using the cell-project crate. The issue specifically affected programs that relied on the cell_project macro for projecting through &Cell, potentially causing unexpected behavior in memory management and type safety guarantees (GitHub Advisory).

Mitigation and workarounds

The issue was resolved in version 0.1.4 of the cell-project crate. Users are advised to update to this version or later, which may result in compile errors for previously unsound usage patterns. The fix involved correcting the variance by using proper pointer types in the macro implementation (GitHub PR).

Community reactions

The vulnerability was discovered and reported by GitHub user SoniEx2, leading to discussions about maintenance and safety of the crate. The project maintainer acknowledged the issue and implemented the fix, while also committing to add MIRI tests to CI to prevent similar issues in the future (GitHub PR).

Additional resources


SourceThis report was generated using AI

Related Rust vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2026-22257HIGH8.8
  • RustRust
  • salvo
NoYesJan 08, 2026
CVE-2026-22698HIGH8.7
  • RustRust
  • sm2
NoNoJan 10, 2026
CVE-2026-22699HIGH7.5
  • RustRust
  • sm2
NoNoJan 10, 2026
GHSA-g59m-gf8j-gjf5LOW3.7
  • RustRust
  • aws-sdk-controlcatalog
NoYesJan 08, 2026
GHSA-585q-cm62-757jLOW2
  • RustRust
  • mnl
NoNoJan 09, 2026

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management