CVE-2023-50711
Rust vulnerability analysis and mitigation

Overview

CVE-2023-50711 affects vmm-sys-util, a collection of modules providing helpers and utilities used by multiple rust-vmm components. The vulnerability was discovered in versions from 0.5.0 to versions prior to 0.12.0, specifically in the FamStructWrapper::deserialize implementation. The issue involves the deserialization process not checking whether the length stored in the header matches the flexible array length, potentially leading to out-of-bounds memory access through Rust-safe methods (GitHub Advisory, NVD).

Technical details

The vulnerability stems from a flaw in the deserialization process where the implementation fails to verify that the length stored in the header matches the flexible array length. When deserializing a FamStructWrapper, the system reconstructs the header from the saved state and then reconstructs the flexible array part separately. The safety of FamStructWrapper methods accessing the underlying memory depends on the header length accurately reflecting the memory size of the flexible array. If the saved state is malformed and the header length implies a flexible array buffer larger than the allocated memory, it can lead to out-of-bounds memory access (GitHub Patch).

Impact

The vulnerability allows potential out-of-bounds memory access through Rust-safe methods. This could lead to memory corruption or unauthorized access to memory regions. The CVSS v3.1 base score varies between assessments, with NVD rating it as 9.8 CRITICAL (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) and GitHub rating it as 5.7 MEDIUM (AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:L) (NVD).

Mitigation and workarounds

The vulnerability was patched in version 0.12.0. The fix includes adding a check that verifies the lengths of compared flexible arrays are equal for any deserialized header and aborting deserialization if they don't match. Additionally, the API was modified so that header length can only be modified through Rust-unsafe code, ensuring users cannot trigger out-of-bounds memory access from Rust-safe code (GitHub Advisory).

Community reactions

The vulnerability has led to security updates in various distributions, including Fedora 38 and 39, which have updated their rust-vmm components and their consumers to address the vulnerability (Fedora Update).

Additional resources


SourceThis report was generated using AI

Related Rust vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2026-22698HIGH8.7
  • RustRust
  • sm2
NoNoJan 10, 2026
CVE-2026-22700HIGH7.5
  • RustRust
  • sm2
NoNoJan 10, 2026
CVE-2026-22699HIGH7.5
  • RustRust
  • sm2
NoNoJan 10, 2026
CVE-2026-22705MEDIUM6.4
  • RustRust
  • ml-dsa
NoYesJan 10, 2026
CVE-2025-15504MEDIUM4.8
  • PythonPython
  • lief
NoYesJan 10, 2026

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management