
Cloud Vulnerability DB
A community-led vulnerabilities database
An issue was discovered in the crypto2 crate through 2021-10-08 for Rust, identified as RUSTSEC-2021-0121 (CVE-2021-45709). The vulnerability affects the Chacha20 encryption and decryption functionality, where an unaligned read of a u32 may occur. The issue was reported on October 8, 2021, and affects the crypto2 project's implementation in Rust (RustSec Advisory).
The vulnerability stems from improper memory buffer operations during Chacha20 encryption and decryption processes. The core issue involves the xorsi512inplace implementation, which creates a u32 slice from a pointer to u8 without fulfilling the proper alignment requirements. This violates the requirements stated in std::slice::fromrawparts_mut, where behavior is undefined if the input pointer is not properly aligned. The severity of this vulnerability is rated as CRITICAL with a CVSS v3.1 Base Score of 9.8 (Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) (NVD Database).
When exploited, this vulnerability can lead to undefined behavior in the application. In debug builds of libstd, the issue manifests as a panic during the call to fromrawparts_mut. The vulnerability affects the security of Chacha20 cipher operations, potentially compromising the cryptographic integrity of systems using the affected versions of the crypto2 crate (GitHub Issue).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."