-
CVSS Score
-The vulnerability stems from improper error handling during snappy decompression of network messages. The advisory explicitly implicates message decompression as the failure point, and Rust's common panic pattern with unwrap()/expect() aligns with the described panic behavior. The function name follows standard Rust module conventions for network services handling compression, and the file path matches typical project structure. While no direct patch is shown, the advisory's technical description provides sufficient evidence to identify the decompression handler as the vulnerable component.
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| ckb | rust | <= 0.34.1 | 0.34.2 |