CVE-2025-55159

NameCVE-2025-55159
Descriptionslab is a pre-allocated storage for a uniform data type. In version 0.4.10, the get_disjoint_mut method incorrectly checked if indices were within the slab's capacity instead of its length, allowing access to uninitialized memory. This could lead to undefined behavior or potential crashes. This has been fixed in slab 0.4.11. A workaround for this issue involves to avoid using get_disjoint_mut with indices that might be beyond the slab's actual length.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Debian ELTS, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
rust-slab (PTS)bullseye0.4.1-1fixed
bookworm0.4.4-1fixed
forky, sid, trixie0.4.9-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
rust-slabsource(unstable)(not affected)

Notes

- rust-slab <not-affected> (Vulnerable code not present)
https://github.com/tokio-rs/slab/security/advisories/GHSA-qx2v-8332-m4fv
https://github.com/tokio-rs/slab/pull/152
Introduced by: https://github.com/tokio-rs/slab/commit/f801afe5cb2379b0178173758273a95f64510527 (v0.4.10)
Fixed by: https://github.com/tokio-rs/slab/commit/2d65c514bc964b192bab212ddf3c1fcea4ae96b8 (v0.4.11)

Search for package or bug name: Reporting problems