CVE-2023-41051
Rust vulnerability analysis and mitigation

Overview

A vulnerability was discovered in the vm-memory Rust crate (CVE-2023-41051) affecting versions from 0.1.0 to versions before 0.12.2. The issue exists in the default implementations of the VolatileMemory trait functions including getatomicref, alignedasref, alignedasmut, getref, and getarrayref, which could allow out-of-bounds memory access if the VolatileMemory::getslice function returns a VolatileSlice whose length is less than the function's count argument (GitHub Advisory).

Technical details

The vulnerability affects the vm-memory crate's VolatileMemory trait implementation. The issue occurs when the getslice function returns a VolatileSlice with a length less than the expected count argument, potentially leading to out-of-bounds memory access. While no implementations of getslice provided in vmmemory are directly affected, custom VolatileMemory implementations may be impacted if they don't properly adhere to getslice's documentation. The vulnerability has been assigned a CVSS v3.1 Base Score of 4.7 MEDIUM by NVD and 2.5 LOW by GitHub (NVD).

Impact

The vulnerability could potentially lead to out-of-bounds memory access in systems using custom implementations of the VolatileMemory trait. This affects Virtual Machine Monitors (VMM) components such as boot loader, virtual device drivers, virtio backend drivers, and vhost drivers that need to access VM physical memory (GitHub Advisory).

Mitigation and workarounds

The issue has been fixed in version 0.12.2 by adding a check that verifies the VolatileSlice returned by get_slice is of the correct length. Users are advised to upgrade to version 0.12.2 or later. There are no known workarounds for this issue (GitHub Advisory, GitHub Commit).

Community reactions

The vulnerability has prompted responses from various Linux distributions. Fedora has released security updates for multiple packages including firecracker, libkrun, and virtiofsd to address the vulnerability by rebuilding them with the patched vm-memory version (Fedora Update).

Additional resources


SourceThis report was generated using AI

Related Rust vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-66627HIGH8.4
  • RustRust
  • wasmi
NoYesDec 09, 2025
GHSA-xrv8-2pf5-f3q7MEDIUM6
  • RustRust
  • nitro-tpm-pcr-compute
NoYesDec 05, 2025
CVE-2025-67487MEDIUM5.5
  • RustRust
  • static-web-server
NoYesDec 09, 2025
CVE-2025-66622LOW1.3
  • RustRust
  • matrix-sdk-base
NoYesDec 09, 2025
RUSTSEC-2025-0135N/AN/A
  • RustRust
  • matrix-sdk-base
NoYesDec 08, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management