-
CVSS Score
-Basic Information
CVE ID
-
GHSA ID
-
EPSS Score
-
CWE
-
Published
-
Updated
-
KEV Status
-
Technology
-
The vulnerability stems from two key unsafe patterns: 1) Drop implementations handling invalidated self-references due to 'static lifetime substitution, and 2) Unsafe byte transmutation that didn't account for padding bytes. The first vulnerable function pattern exists in macro-generated destructors that maintain invalid references during drop(). The second exists in internal conversion logic that used raw transmutes instead of MaybeUninit wrappers, exposing uninitialized memory. These conclusions align with the advisory's description of Miri-detected reference validity issues and padding initialization problems.
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| ouroboros | rust | < 0.16.0 | 0.16.0 |
Ongoing coverage of React2Shell