** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.
CVSS
No CVSS.
References
No reference.
Configurations
No configuration.
History
03 Jan 2022, 08:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Summary | ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none. |
02 Jan 2022, 15:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Summary | ** DISPUTED ** {fmt} 7.1.0 through 8.0.1 has a stack-based buffer overflow in fmt::v8::detail::dragonbox::umul192_upper64 (called from fmt::v8::detail::dragonbox::cache_accessor<double>::compute_mul and fmt::v8::detail::dragonbox::decimal_fp<double> fmt::v8::detail::dragonbox::to_de). NOTE: the vendor states that "This is one of a series of false positives [caused by a] fuzzing infra issue." |
01 Jan 2022, 00:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2022-01-01 00:15
Updated : 2024-02-04 22:08
NVD link : CVE-2021-45959
Mitre link : CVE-2021-45959
CVE.ORG link : CVE-2021-45959
JSON object : View
Products Affected
No product.
CWE
No CWE.