Skip to content

security: fix RUSTSEC-2025-0047 - upgrade slab from 0.4.10 to 0.4.11#2564

Closed
tac0turtle wants to merge 1 commit intomainfrom
claude/issue-2563-20250812-1037
Closed

security: fix RUSTSEC-2025-0047 - upgrade slab from 0.4.10 to 0.4.11#2564
tac0turtle wants to merge 1 commit intomainfrom
claude/issue-2563-20250812-1037

Conversation

@tac0turtle
Copy link
Contributor

This addresses the security vulnerability in slab v0.4.10 where get_disjoint_mut incorrectly checked indices against capacity instead of length, allowing out-of-bounds access to uninitialized memory.

  • Added slab = "0.4.11" to workspace dependencies
  • Updated Cargo.lock to use patched version

Fixes #2563

Generated with Claude Code

This addresses the security vulnerability in slab v0.4.10 where get_disjoint_mut
incorrectly checked indices against capacity instead of length, allowing
out-of-bounds access to uninitialized memory.

- Added slab = 0.4.11 to workspace dependencies
- Updated Cargo.lock to use patched version

Fixes #2563

Co-authored-by: Marko <tac0turtle@users.noreply.github.com>
Copy link
Contributor

@gemini-code-assist gemini-code-assist bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Summary of Changes

Hello @tac0turtle, I'm Gemini Code Assist1! I'm currently reviewing this pull request and will post my feedback shortly. In the meantime, here's a summary to help you and other reviewers quickly get up to speed!

This pull request focuses on enhancing the project's security posture by addressing a known vulnerability in the slab crate. The core change involves upgrading this dependency to a patched version, which resolves an issue that could lead to out-of-bounds memory access. This update ensures the project utilizes a more secure and stable version of the slab library, safeguarding against potential exploits related to memory handling.

Highlights

  • Dependency Upgrade: Upgraded the slab crate from version 0.4.10 to 0.4.11 to mitigate a security vulnerability (RUSTSEC-2025-0047) related to incorrect index checking.
  • Build Configuration: Modified Cargo.toml to explicitly include slab = "0.4.11" as a workspace dependency, ensuring the updated version is used across the project.
  • Lock File Update: Updated Cargo.lock to reflect the new slab version and its corresponding checksum, ensuring reproducible builds with the patched dependency.
Using Gemini Code Assist

The full guide for Gemini Code Assist can be found on our documentation page, here are some quick tips.

Invoking Gemini

You can request assistance from Gemini at any point in your pull request via creating an issue comment (i.e. comment on the pull request page) using either /gemini <command> or @gemini-code-assist <command>. Below is a summary of the supported commands.

Feature Command Description
Code Review /gemini review Performs a code review for the current pull request in its current state.
Pull Request Summary /gemini summary Provides a summary of the current pull request in its current state.
Comment @gemini-code-assist Responds in comments when explicitly tagged, both in issue comments and review comments.
Help /gemini help Displays a list of available commands.

Customization

To customize Gemini Code Assist for GitHub experience, repository maintainers can create a configuration file and/or provide a custom code review style guide (such as PEP-8 for Python) by creating and adding files to a .gemini/ folder in the base of the repository. Detailed instructions can be found here.

Limitations & Feedback

Gemini Code Assist may make mistakes. Please leave feedback on any instances where its feedback is incorrect or counter productive. You can react with 👍 and 👎 on @gemini-code-assist comments. If you're interested in giving your feedback about your experience with Gemini Code Assist for Github and other Google products, sign up here.

You can also get AI-powered code generation, chat, as well as code reviews directly in the IDE at no cost with the Gemini Code Assist IDE Extension.

Footnotes

  1. Review the Privacy Notices, Generative AI Prohibited Use Policy, Terms of Service, and learn how to configure Gemini Code Assist in GitHub here. Gemini can make mistakes, so double check it and use code with caution.

@github-actions
Copy link
Contributor

The latest Buf updates on your PR. Results from workflow CI and Release / buf-check (pull_request).

BuildFormatLintBreakingUpdated (UTC)
✅ passed⏩ skipped✅ passed✅ passedAug 12, 2025, 10:42 AM

@tac0turtle tac0turtle closed this Aug 12, 2025
@github-project-automation github-project-automation bot moved this to Done in Evolve Aug 12, 2025
@tac0turtle tac0turtle deleted the claude/issue-2563-20250812-1037 branch August 12, 2025 10:43
Copy link
Contributor

@gemini-code-assist gemini-code-assist bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Code Review

This pull request addresses a security vulnerability in the slab crate by upgrading it from version 0.4.10 to 0.4.11. The changes correctly update Cargo.lock and specify the new version in the Cargo.toml workspace dependencies. My review includes a suggestion to use a more idiomatic approach for patching transitive dependencies in Rust by using the [patch] section, which can improve clarity and maintainability.

tonic = { version = "0.10", features = ["transport"] }
tonic-build = "0.10"
walkdir = "2.5.0"
slab = "0.4.11"
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

medium

While adding slab to [workspace.dependencies] works for updating the transitive dependency, a more idiomatic approach in Rust for overriding dependency versions, especially for security patches, is to use the [patch] table in your root Cargo.toml. This makes the intent of overriding a specific version clearer and avoids adding transitive-only dependencies to your [workspace.dependencies] section.

Consider removing this line and adding the following to your Cargo.toml instead:

[patch.crates-io]
slab = "0.4.11"

After this change, you may need to run cargo update to ensure Cargo.lock reflects the patch correctly.

@codecov
Copy link

codecov bot commented Aug 12, 2025

Codecov Report

✅ All modified and coverable lines are covered by tests.
✅ Project coverage is 72.38%. Comparing base (6bdc919) to head (376f571).

Additional details and impacted files
@@           Coverage Diff           @@
##             main    #2564   +/-   ##
=======================================
  Coverage   72.38%   72.38%           
=======================================
  Files          71       71           
  Lines        7211     7211           
=======================================
  Hits         5220     5220           
  Misses       1570     1570           
  Partials      421      421           
Flag Coverage Δ
combined 72.38% <ø> (ø)

Flags with carried forward coverage won't be shown. Click here to find out more.

☔ View full report in Codecov by Sentry.
📢 Have feedback on the report? Share it here.

🚀 New features to boost your workflow:
  • ❄️ Test Analytics: Detect flaky tests, report on failures, and find test suite problems.

@tac0turtle tac0turtle removed this from Evolve Aug 25, 2025
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

RUSTSEC-2025-0047: Out-of-bounds access in get_disjoint_mut due to incorrect bounds check

1 participant