| 概要 | An integer overflow vulnerability in the simdjson document-builder API allows incorrect buffer size calculations in "string_builder::escape_and_append()" when processing very large input strings on platforms with limited "size_t" width (e.g., 32-bit builds). The overflow can cause insufficient buffer allocation, leading to out-of-bounds memory reads in SIMD routines and potentially resulting in information disclosure, memory corruption, or malformed JSON output. |
|---|---|
| 公表日 | 2026年5月14日20:16 |
| 登録日 | 2026年5月15日4:24 |
| 最終更新日 | 2026年5月15日1:04 |