Vulnerability DatabaseRUSTSEC-2024-0426

RUSTSEC-2024-0426
Rust vulnerability analysis and mitigation

Overview

The vulnerability (RUSTSEC-2024-0426) affects the spl-token-swap library in the Solana Program Library, specifically in the instruction::unpack function implementation. The issue was discovered and reported on September 12, 2023, highlighting an unsound implementation that could potentially lead to undefined behavior and memory safety issues (GitHub Issue).

Technical details

The vulnerability exists in the instruction::unpack function within the token-swap program's instruction.rs file. The function contains an unsafe implementation that can cast u8 type with any bit patterns to arbitrary types, potentially breaking validity invariants that should be maintained in Rust programs. Additionally, the implementation can violate memory alignment requirements, leading to undefined behavior when handling certain data types (GitHub Issue).

Impact

The vulnerability can result in undefined behavior and memory safety violations. When tested with the Miri interpreter, it demonstrates the ability to construct invalid values and trigger misaligned pointer dereferences, which could lead to program crashes or unpredictable behavior (GitHub Issue).

Mitigation and workarounds

The spl-token-swap program has been noted as unmaintained for several years, and the Solana Program Library team has decided to move SPL programs into separate repositories. The program will not be maintained further as the repository is being archived (GitHub Issue).

Community reactions

The vulnerability has been included in the RustSec advisory database and will be surfaced by security tools such as cargo-audit or cargo-deny as a warning rather than a hard error, indicating its recognition as a significant API soundness issue (GitHub Issue).

Additional resources


SourceThis report was generated using AI

Related Rust vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-65807HIGH8.4
  • RustRust
  • sd
NoNoDec 10, 2025
CVE-2025-66627HIGH7.8
  • RustRust
  • wasmi
NoYesDec 09, 2025
CVE-2025-67487MEDIUM5.5
  • RustRust
  • static-web-server
NoYesDec 09, 2025
CVE-2025-66622LOW1.3
  • RustRust
  • matrix-sdk-base
NoYesDec 09, 2025
RUSTSEC-2025-0135N/AN/A
  • RustRust
  • matrix-sdk-base
NoYesDec 08, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management