
Cloud Vulnerability DB
A community-led vulnerabilities database
The vulnerability (RUSTSEC-2024-0386) was discovered in the strason Rust library, specifically related to unsound implementation of unsafe code in the conversion from [u8] to Json types. The issue was identified and reported on August 20, 2024, affecting the latest version of the strason library (GitHub Issue).
The vulnerability exists in the visit_bytes function implementation at src/object.rs line 40. The function performs an unsafe conversion from [u8] to Json using raw pointers, which can create misalignment issues when the type size of [u8] is smaller than the type size of Json. This implementation could potentially lead to undefined behaviors in Rust (GitHub Issue).
The unsound implementation could result in undefined behaviors in Rust programs using this library. If the problematic converted types are manipulated, it could potentially lead to various consequences including access out-of-bound issues (GitHub Issue).
The library maintainer has acknowledged the issue and indicated that the library has been unmaintained for over 6 years. Users are discouraged from using this library, and the maintainer plans to push a new major revision that removes the library functionality to prevent further usage through crates.io (GitHub Issue).
The issue was reported to the RustSec Advisory Database, indicating community awareness and proper vulnerability tracking procedures (GitHub Issue).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."