-
CVSS Score
-Basic Information
CVE ID
-
GHSA ID
-
EPSS Score
-
CWE
-
Published
-
Updated
-
KEV Status
-
Technology
-
The vulnerability stemmed from using read_from() with ELF-supplied offsets without validating against actual file size. The commit replaced these with read_exact(), which validates full reads. The affected code paths were: 1) ELF header parsing, 2) program header loop, and 3) note header processing. All three locations used the vulnerable read pattern and were directly modified in the security patch.
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| linux-loader | rust | < 0.8.1 | 0.8.1 |
Ongoing coverage of React2Shell