RUSTSEC-2025-0109

Source
https://rustsec.org/advisories/RUSTSEC-2025-0109
Import Source
https://github.com/rustsec/advisory-db/blob/osv/crates/RUSTSEC-2025-0109.json
JSON Data
https://api.osv.dev/v1/vulns/RUSTSEC-2025-0109
Published
2025-10-21T12:00:00Z
Modified
2025-10-22T21:23:29Z
Summary
Out-of-bounds memory access in binary_read_to_ref and binary_write_from_ref
Details

Safe functions accept a single &T or &mut T but multiply by n to create slices extending beyond allocated memory when n > 1.

These functions use from_raw_parts to create slices larger than the underlying allocation, violating memory safety.

The binaryvecio repository is archived and unmaintained.

Database specific
{
    "license": "CC0-1.0"
}
References

Affected packages

crates.io / binary_vec_io

Package

Name
binary_vec_io
View open source insights on deps.dev
Purl
pkg:cargo/binary_vec_io

Affected ranges

Type
SEMVER
Events
Introduced
0.0.0-0

Ecosystem specific

{
    "affects": {
        "arch": [],
        "os": [],
        "functions": [
            "binary_vec_io::binary_read_to_ref",
            "binary_vec_io::binary_write_from_ref"
        ]
    },
    "affected_functions": null
}

Database specific

categories

[
    "memory-corruption"
]

informational

"unsound"

cvss

null