Use After Free Affecting actix-web package, versions <0.7.15


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.24% (63rd percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Use After Free vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-RUST-ACTIXWEB-1013847
  • published29 Sept 2020
  • disclosed8 Jun 2018
  • creditUnknown

Introduced: 8 Jun 2018

CVE-2018-25024  (opens in a new tab)
CVE-2018-25025  (opens in a new tab)
CVE-2018-25026  (opens in a new tab)
CWE-416  (opens in a new tab)

How to fix?

Upgrade actix-web to version 0.7.15 or higher.

Overview

actix-web is a fast web framework for Rust.

Affected versions of this package are vulnerable to Use After Free. It contains multiple memory safety issues, such as:

  • Unsoundly coercing immutable references to mutable references
  • Unsoundly extending lifetimes of strings
  • Adding the Send marker trait to objects that cannot be safely sent between threads This may result in a variety of memory corruption scenarios, most likely use-after-free.

CVSS Scores

version 3.1