Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-44xp-hxfq-7fh9

Опубликовано: 19 дек. 2025
Источник: github
Github: Не прошло ревью
CVSS4: 1.9
CVSS3: 5.3

Описание

A security flaw has been discovered in floooh sokol up to 33e2271c431bf21de001e972f72da17a984da932. This vulnerability affects the function _sg_pipeline_common_init in the library sokol_gfx.h. Performing manipulation results in heap-based buffer overflow. The attack needs to be approached locally. The exploit has been released to the public and may be exploited. This product uses a rolling release model to deliver continuous updates. As a result, specific version information for affected or updated releases is not available. The patch is named 33e2271c431bf21de001e972f72da17a984da932. It is suggested to install a patch to address this issue.

A security flaw has been discovered in floooh sokol up to 33e2271c431bf21de001e972f72da17a984da932. This vulnerability affects the function _sg_pipeline_common_init in the library sokol_gfx.h. Performing manipulation results in heap-based buffer overflow. The attack needs to be approached locally. The exploit has been released to the public and may be exploited. This product uses a rolling release model to deliver continuous updates. As a result, specific version information for affected or updated releases is not available. The patch is named 33e2271c431bf21de001e972f72da17a984da932. It is suggested to install a patch to address this issue.

EPSS

Процентиль: 4%
0.0002
Низкий

1.9 Low

CVSS4

5.3 Medium

CVSS3

Дефекты

CWE-119
CWE-787

Связанные уязвимости

CVSS3: 5.3
nvd
около 2 месяцев назад

A security flaw has been discovered in floooh sokol up to 33e2271c431bf21de001e972f72da17a984da932. This vulnerability affects the function _sg_pipeline_common_init in the library sokol_gfx.h. Performing manipulation results in heap-based buffer overflow. The attack needs to be approached locally. The exploit has been released to the public and may be exploited. This product uses a rolling release model to deliver continuous updates. As a result, specific version information for affected or updated releases is not available. The patch is named 33e2271c431bf21de001e972f72da17a984da932. It is suggested to install a patch to address this issue.

EPSS

Процентиль: 4%
0.0002
Низкий

1.9 Low

CVSS4

5.3 Medium

CVSS3

Дефекты

CWE-119
CWE-787