Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-rwxp-c37g-r3vj

Опубликовано: 02 янв. 2022
Источник: github
Github: Не прошло ревью

Описание

{fmt} 7.1.0 through 8.0.1 has a stack-based buffer overflow in fmt::v8::detail::dragonbox::umul192_upper64 (called from fmt::v8::detail::dragonbox::cache_accessor::compute_mul and fmt::v8::detail::dragonbox::decimal_fp fmt::v8::detail::dragonbox::to_de).

{fmt} 7.1.0 through 8.0.1 has a stack-based buffer overflow in fmt::v8::detail::dragonbox::umul192_upper64 (called from fmt::v8::detail::dragonbox::cache_accessor::compute_mul and fmt::v8::detail::dragonbox::decimal_fp fmt::v8::detail::dragonbox::to_de).

Связанные уязвимости

nvd
около 4 лет назад

Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none