-
CVSS Score
-Basic Information
CVE ID
-
GHSA ID
-
EPSS Score
-
CWE
-
Published
-
Updated
-
KEV Status
-
Technology
-
The vulnerability stems from c_chars_to_str's unsafe conversion of C chars to Rust string without null-termination check. The original implementation used CStr::from_ptr() which relies on strlen() to find terminator. The patched commit shows this function was modified to add null-check validation using from_bytes_until_nul, confirming this was the vulnerable entry point. Stack traces in reports show the crash occurs in this function's conversion logic.
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| dbn | rust | < 0.22.0 | 0.22.0 |
Ongoing coverage of React2Shell