Описание
Buffer-overflow in jsdtoa.c in Artifex MuJS in versions 1.0.1 to 1.1.1. An integer overflow happens when js_strtod() reads in floating point exponent, which leads to a buffer overflow in the pointer *d.
| Релиз | Статус | Примечание |
|---|---|---|
| bionic | DNE | |
| devel | not-affected | |
| esm-apps/jammy | not-affected | |
| esm-infra/focal | DNE | |
| focal | DNE | |
| jammy | not-affected | 1.1.3-3 |
| kinetic | not-affected | |
| lunar | not-affected | |
| trusty | ignored | end of standard support |
| upstream | released | 1.1.3-2 |
Показывать по
EPSS
9.8 Critical
CVSS3
Связанные уязвимости
Buffer-overflow in jsdtoa.c in Artifex MuJS in versions 1.0.1 to 1.1.1. An integer overflow happens when js_strtod() reads in floating point exponent, which leads to a buffer overflow in the pointer *d.
Buffer-overflow in jsdtoa.c in Artifex MuJS in versions 1.0.1 to 1.1.1 ...
Buffer-overflow in jsdtoa.c in Artifex MuJS in versions 1.0.1 to 1.1.1. An integer overflow happens when js_strtod() reads in floating point exponent, which leads to a buffer overflow in the pointer *d.
EPSS
9.8 Critical
CVSS3