CVE-2019-25004
Description
An issue was discovered in the flatbuffers crate before 0.6.1 for Rust. Arbitrary bytes can be reinterpreted as a bool, defeating soundness.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Flatbuffers Rust crate before 0.6.1 allows arbitrary bytes to be reinterpreted as a bool, causing undefined behavior.
Vulnerability
Description
The flatbuffers crate for Rust, prior to version 0.6.1, contains an unsound implementation of the Follow trait for the bool type [1]. The Follow::follow function uses read_scalar_at::, which effectively performs a transmute from arbitrary bytes to a bool [4]. This violates Rust's type safety guarantees, as a bool must only have the bit patterns 0x00 or 0x01. Any other byte value results in an invalid boolean, leading to undefined behavior (UB).
Exploitation
Conditions
An attacker can trigger the vulnerability by providing malicious serialized data crafted with a byte that is not 0 or 1 in a position where a bool is expected [2]. The affected function is invoked when deserializing FlatBuffers messages. No special authentication or network position is required; any application using the vulnerable crate to parse untrusted input is at risk. The attack vector is network-based, with low complexity and no privileges required, as reflected in the CVSS score of 9.8 [2].
Impact
Exploitation can lead to undefined behavior, which may manifest as memory corruption, crashes, or potential code execution. Since UB undermines all safety guarantees in Rust, it could allow an attacker to bypass security checks or cause denial of service. The high CVSS score indicates severe impact on confidentiality, integrity, and availability [2].
Mitigation
The flaw was addressed in flatbuffers version 0.6.1 by correcting the Follow implementation to properly validate boolean values [2]. Users should update to 0.6.1 or later. Versions prior to 0.4.0 are also unaffected, but the advisory recommends upgrading to the patched release [2]. No workaround is available other than updating.
AI Insight generated on May 21, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
flatbufferscrates.io | >= 0.4.0, < 0.6.1 | 0.6.1 |
Affected products
2- rust/flatbuffersdescription
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4- github.com/advisories/GHSA-gx73-2498-r55cghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2019-25004ghsaADVISORY
- github.com/google/flatbuffers/issues/5530ghsaWEB
- rustsec.org/advisories/RUSTSEC-2019-0028.htmlghsax_refsource_MISCWEB
News mentions
0No linked articles in our index yet.