Описание
A vulnerability, which was classified as problematic, was found in spdlog up to 1.15.1. This affects the function scoped_padder in the library include/spdlog/pattern_formatter-inl.h. The manipulation leads to resource consumption. It is possible to launch the attack on the local host. The exploit has been disclosed to the public and may be used. Upgrading to version 1.15.2 is able to address this issue. The identifier of the patch is 10320184df1eb4638e253a34b1eb44ce78954094. It is recommended to upgrade the affected component.
Релиз | Статус | Примечание |
---|---|---|
devel | not-affected | 1:1.15.3+ds-1 |
esm-apps/bionic | needs-triage | |
esm-apps/focal | needs-triage | |
esm-apps/jammy | needs-triage | |
esm-apps/noble | needs-triage | |
esm-apps/xenial | needs-triage | |
jammy | needs-triage | |
noble | needs-triage | |
oracular | needs-triage | |
plucky | needs-triage |
Показывать по
Ссылки на источники
EPSS
1.7 Low
CVSS2
3.3 Low
CVSS3
Связанные уязвимости
A resource exhaustion vulnerability has been discovered in the spdlog library. This flaw can be exploited by an attacker to cause the program utilizing spdlog to become unresponsive, leading to a denial-of-service condition.
A vulnerability, which was classified as problematic, was found in spdlog up to 1.15.1. This affects the function scoped_padder in the library include/spdlog/pattern_formatter-inl.h. The manipulation leads to resource consumption. It is possible to launch the attack on the local host. The exploit has been disclosed to the public and may be used. Upgrading to version 1.15.2 is able to address this issue. The identifier of the patch is 10320184df1eb4638e253a34b1eb44ce78954094. It is recommended to upgrade the affected component.
A vulnerability, which was classified as problematic, was found in spd ...
A vulnerability, which was classified as problematic, was found in spdlog up to 1.15.1. This affects the function scoped_padder in the library include/spdlog/pattern_formatter-inl.h. The manipulation leads to resource consumption. It is possible to launch the attack on the local host. The exploit has been disclosed to the public and may be used. Upgrading to version 1.15.2 is able to address this issue. The identifier of the patch is 10320184df1eb4638e253a34b1eb44ce78954094. It is recommended to upgrade the affected component.
EPSS
1.7 Low
CVSS2
3.3 Low
CVSS3