Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-25541: CWE-680: Integer Overflow to Buffer Overflow in tokio-rs bytes

0
Medium
VulnerabilityCVE-2026-25541cvecve-2026-25541cwe-680
Published: Wed Feb 04 2026 (02/04/2026, 22:03:53 UTC)
Source: CVE Database V5
Vendor/Project: tokio-rs
Product: bytes

Description

CVE-2026-25541 is a medium severity integer overflow vulnerability in the tokio-rs bytes library versions 1. 2. 1 through 1. 11. 0. It occurs in the BytesMut::reserve function where unchecked addition can overflow the usize type in release builds, causing the capacity value to be corrupted. This leads to out-of-bounds slices and undefined behavior, potentially resulting in memory corruption or crashes. The vulnerability does not require authentication or user interaction and has no known exploits in the wild. It has been patched in version 1. 11.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/12/2026, 07:33:51 UTC

Technical Analysis

The vulnerability CVE-2026-25541 affects the bytes library, a utility for byte manipulation used in the tokio-rs asynchronous runtime ecosystem. Specifically, the issue lies in the BytesMut::reserve method, which is responsible for ensuring sufficient capacity in a mutable byte buffer. In versions from 1.2.1 up to but not including 1.11.1, the code performs an unchecked addition of new_cap and offset without verifying for integer overflow. In release builds, where overflow checks are disabled, this addition can wrap around the usize type, causing the condition 'v_capacity >= new_cap + offset' to incorrectly evaluate as true. Consequently, self.cap is set to a value larger than the actual allocated buffer capacity. Subsequent operations, such as spare_capacity_mut(), trust this corrupted capacity value and create slices that extend beyond the allocated memory bounds. This results in undefined behavior, including potential memory corruption, crashes, or exploitation vectors for arbitrary code execution. Debug builds do not exhibit this issue due to overflow panics. The vulnerability is classified under CWE-680 (Integer Overflow to Buffer Overflow). No known exploits have been reported in the wild, and the issue was patched in version 1.11.1 by adding proper overflow checks or safe arithmetic operations.

Potential Impact

For European organizations, the impact of this vulnerability depends on the extent to which the affected bytes library versions are embedded within their Rust-based applications or services, particularly those leveraging the tokio runtime for asynchronous operations. Exploitation could lead to memory corruption, application crashes, or potentially arbitrary code execution if an attacker can control input parameters leading to the overflow condition. This could compromise confidentiality, integrity, and availability of affected systems. Critical infrastructure, financial services, and technology companies using Rust in backend services or networked applications are at higher risk. The vulnerability does not require user interaction or authentication, increasing its risk profile in local or internal threat scenarios. However, the lack of known exploits and the medium CVSS score suggest moderate urgency. Nonetheless, unpatched systems could be targeted in future attacks once exploit techniques become available.

Mitigation Recommendations

European organizations should immediately audit their software supply chain and internal applications to identify usage of the bytes library versions between 1.2.1 and 1.11.0. They should upgrade all affected dependencies to version 1.11.1 or later where the vulnerability is patched. For applications where immediate upgrading is not feasible, consider applying compiler flags or runtime checks to detect integer overflows during testing and staging. Employ fuzz testing and memory safety analysis tools to detect out-of-bounds accesses related to this issue. Additionally, implement strict input validation and sandboxing for components handling untrusted data that utilize the bytes library. Monitoring for anomalous crashes or memory errors in production environments can help detect exploitation attempts. Finally, maintain an up-to-date inventory of Rust dependencies and integrate automated dependency scanning tools to catch similar vulnerabilities proactively.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-02-02T19:59:47.375Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6983c4edf9fa50a62fb05c7f

Added to database: 2/4/2026, 10:15:09 PM

Last enriched: 2/12/2026, 7:33:51 AM

Last updated: 3/21/2026, 6:16:53 AM

Views: 96

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses