GHSA-X43W-PH7M-PFJX
Vulnerability from github – Published: 2026-02-25 19:23 – Updated: 2026-02-25 19:23
VLAI?
Summary
hexchat crate has a Use After Free vulnerability
Details
All versions of this crate have function deregister_command which can result in use after free. This is unsound.
In addition, all versions since 0.3.0 have "safe" macros, which are documented as unsafe to use in threads.
In addition, the hexchat crate is no longer actively maintained. If users rely on this crate, consider switching to an alternative.
Severity ?
{
"affected": [
{
"package": {
"ecosystem": "crates.io",
"name": "hexchat"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "0.6.3"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"aliases": [],
"database_specific": {
"cwe_ids": [
"CWE-416"
],
"github_reviewed": true,
"github_reviewed_at": "2026-02-25T19:23:47Z",
"nvd_published_at": null,
"severity": "HIGH"
},
"details": "All versions of this crate have function `deregister_command` which can result in use after free. This is unsound.\n\nIn addition, all versions since 0.3.0 have \"safe\" macros, which are documented as unsafe to use in threads.\n\nIn addition, the `hexchat` crate is no longer actively maintained. If users rely on this crate, consider switching to an alternative.",
"id": "GHSA-x43w-ph7m-pfjx",
"modified": "2026-02-25T19:23:47Z",
"published": "2026-02-25T19:23:47Z",
"references": [
{
"type": "WEB",
"url": "https://github.com/pie-flavor/hexchat-rs/issues/3"
},
{
"type": "PACKAGE",
"url": "https://github.com/pie-flavor/hexchat-rs"
},
{
"type": "WEB",
"url": "https://rustsec.org/advisories/RUSTSEC-2025-0153.html"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U",
"type": "CVSS_V4"
}
],
"summary": "hexchat crate has a Use After Free vulnerability"
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…