-
CVSS Score
-| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| surrealdb | rust | >= 2.0.0, < 2.0.4 | 2.0.4 |
| surrealdb-core | rust | >= 2.0.0, < 2.0.4 | 2.0.4 |
The vulnerability stems from error rendering code in Location implementation (core/src/syn/error/location.rs) that previously used (0,0) for empty sources. The added test cases in test.rs explicitly check error handling for empty string conversions to various types (thing, duration, datetime, etc.). These functions would trigger parsing errors that expose the vulnerable error rendering logic. The commit fixes both the location handling and adds tests for these specific conversion functions, indicating they were vulnerable entry points. The high confidence comes from direct correlation between added tests and patched error handling logic.
A Semantic Attack on Google Gemini - Read the Latest Research