CVE-2021-25903
Description
An issue was discovered in the cache crate through 2021-01-01 for Rust. A raw pointer is dereferenced.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
The `cache` crate for Rust dereferences a raw pointer, enabling unsound memory access that can lead to denial of service.
Vulnerability
Analysis
The cache crate (crates.io) prior to the advisory date contains a flaw where an internally used raw pointer is exposed or dereferenced unsafely [2]. The official description states simply that a raw pointer is dereferenced, which in Rust indicates a violation of memory safety guarantees [1]. This unsoundness can cause the program to access invalid memory, leading to undefined behavior.
Attack
Vector
An attacker can exploit this vulnerability over the network without authentication or user interaction (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) [2]. The low attack complexity suggests that crafting an exploit does not require special conditions. However, the exact mechanism of exploitation depends on how the cache is populated and accessed; an attacker would need to provide or control data that triggers the raw pointer dereference.
Impact
The primary impact is availability — the vulnerability has a high impact on availability, meaning an exploit can crash the application or cause a denial of service [2]. There is no confidentiality or integrity impact noted in the CVSS vector. The RustSec advisory categorizes this as an "Unsound" issue that can lead to memory corruption [2].
Mitigation
According to the RustSec advisory, no patched versions of the cache crate have been released [2]. Users of the crate should evaluate their dependence on it and consider replacing it with an alternative crate that provides similar functionality with safe memory handling. The advisory was last modified in June 2023, and the crate may be considered unmaintained.
AI Insight generated on May 21, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
cachecrates.io | <= 0.1.0 | — |
Affected products
2- Rust/cachedescription
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4- github.com/advisories/GHSA-gh87-6jr3-8q47ghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2021-25903ghsaADVISORY
- github.com/krl/cache/issues/2ghsaWEB
- rustsec.org/advisories/RUSTSEC-2021-0006.htmlghsax_refsource_MISCWEB
News mentions
0No linked articles in our index yet.