RUSTSEC-2025-0047

Source
https://rustsec.org/advisories/RUSTSEC-2025-0047
Import Source
https://github.com/rustsec/advisory-db/blob/osv/crates/RUSTSEC-2025-0047.json
JSON Data
https://api.osv.dev/v1/vulns/RUSTSEC-2025-0047
Aliases
Published
2025-08-12T12:00:00Z
Modified
2025-08-12T09:57:09.609745Z
Summary
Out-of-bounds access in `get_disjoint_mut` due to incorrect bounds check
Details

Impact

The get_disjoint_mut method in slab v0.4.10 incorrectly checked if indices were within the slab's capacity instead of its length, allowing access to uninitialized memory. This could lead to undefined behavior or potential crashes.

Patches

This has been fixed in slab v0.4.11.

Workarounds

Avoid using get_disjoint_mut with indices that might be beyond the slab's actual length, or upgrade to v0.4.11 or later.

References

Database specific
{
    "license": "CC0-1.0"
}
References

Affected packages

crates.io / slab

Package

Affected ranges

Type
SEMVER
Events
Introduced
0.4.10
Fixed
0.4.11

Ecosystem specific

{
    "affected_functions": null,
    "affects": {
        "functions": [
            "slab::Slab::get_disjoint_mut"
        ],
        "arch": [],
        "os": []
    }
}

Database specific

{
    "cvss": null,
    "categories": [],
    "informational": null
}