DEBIAN-CVE-2026-25541

Source
https://security-tracker.debian.org/tracker/CVE-2026-25541
Import Source
https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2026-25541.json
JSON Data
https://api.osv.dev/v1/vulns/DEBIAN-CVE-2026-25541
Upstream
Published
2026-02-04T22:16:00.383Z
Modified
2026-02-07T17:18:38.155047Z
Severity
  • 5.5 (Medium) CVSS_V4 - CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X CVSS Calculator
Summary
[none]
Details

Bytes is a utility library for working with bytes. From version 1.2.1 to before 1.11.1, Bytes is vulnerable to integer overflow in BytesMut::reserve. In the unique reclaim path of BytesMut::reserve, if the condition "vcapacity >= newcap + offset" uses an unchecked addition. When newcap + offset overflows usize in release builds, this condition may incorrectly pass, causing self.cap to be set to a value that exceeds the actual allocated capacity. Subsequent APIs such as sparecapacity_mut() then trust this corrupted cap value and may create out-of-bounds slices, leading to UB. This behavior is observable in release builds (integer overflow wraps), whereas debug builds panic due to overflow checks. This issue has been patched in version 1.11.1.

References

Affected packages

Debian:12 / rust-bytes

Package

Name
rust-bytes
Purl
pkg:deb/debian/rust-bytes?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*
1.2.1-1
1.4.0-1
1.5.0-1
1.7.2-1
1.8.0-1
1.9.0-1
1.10.1-1
1.11.0-1
1.11.1-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2026-25541.json"

Debian:13 / rust-bytes

Package

Name
rust-bytes
Purl
pkg:deb/debian/rust-bytes?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*
1.9.0-1
1.10.1-1
1.11.0-1
1.11.1-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2026-25541.json"

Debian:14 / rust-bytes

Package

Name
rust-bytes
Purl
pkg:deb/debian/rust-bytes?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.11.1-1

Affected versions

1.*
1.9.0-1
1.10.1-1
1.11.0-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2026-25541.json"