Vulnerability DatabaseRUSTSEC-2025-0049

RUSTSEC-2025-0049
Rust vulnerability analysis and mitigation

Overview

A memory corruption vulnerability was discovered in the scratchpad crate version 1.3.1 where custom implementations of the scratchpad::Tracking trait can lead to heap buffer overflow. The vulnerability was identified by the PursecLab security research team and reported on August 3, 2025. The issue stems from the Tracking trait not being marked as unsafe despite being used in unsafe code regions within the library (PursecLab Issue).

Technical details

The vulnerability exists because the methods Tracking::capacity, Tracking::set and Tracking::get are invoked within unsafe regions of the library, but the Tracking trait itself is not marked as unsafe. This allows users to provide custom implementations that can trigger undefined behavior. The issue manifests specifically in the Marker::allocateslicecopy method which calls Marker::allocatearrayuninitialized, leading to potential memory corruption when user-defined Tracking implementations return incorrect values (PursecLab Issue).

Impact

When exploited, this vulnerability can cause heap buffer overflow, leading to memory corruption and potential arbitrary code execution. The issue can be triggered without using any unsafe code on the user side, making it particularly concerning as it violates Rust's memory safety guarantees (PursecLab Issue).

Mitigation and workarounds

The proposed fix is to mark the Tracking trait as unsafe, since the library's internal unsafe code relies on the correctness of its implementations. This would properly signal to users that implementing this trait requires careful consideration of safety guarantees (PursecLab Issue).

Additional resources


SourceThis report was generated using AI

Related Rust vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-65807HIGH8.4
  • RustRust
  • sd
NoNoDec 10, 2025
CVE-2025-66627HIGH7.8
  • RustRust
  • wasmi
NoYesDec 09, 2025
CVE-2025-67487MEDIUM5.5
  • RustRust
  • static-web-server
NoYesDec 09, 2025
CVE-2025-66622LOW1.3
  • RustRust
  • matrix-sdk-base
NoYesDec 09, 2025
RUSTSEC-2025-0135N/AN/A
  • RustRust
  • matrix-sdk-base
NoYesDec 08, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management