We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Originally reported here: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=33991
Also listed as SONATYPE-2021-1261 and https://osv.dev/vulnerability/OSV-2021-732.
The text was updated successfully, but these errors were encountered:
Fix a buffer overflow
d9b3c92
It happens if raw_str_used underflows and ends up a very large number, which is then used as the size of a string. Closes WizardMac#285.
Fix a buffer overflow (#311)
c7baae7
It happens if raw_str_used underflows and ends up a very large number, which is then used as the size of a string. Closes #285.
Successfully merging a pull request may close this issue.
Originally reported here: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=33991
Also listed as SONATYPE-2021-1261 and https://osv.dev/vulnerability/OSV-2021-732.
The text was updated successfully, but these errors were encountered: