You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Hi,
we have detected that your project may be vulnerable to Integer Overflow to Buffer Overflow in the function of free_completions in the file of src/utils/edit.c . It shares similarities to a recent CVE disclosure CVE-2024-6381 in the mongo-c-driver.
The source vulnerability information is as follows:
Vulnerability Detail:
CVE Identifier: CVE-2024-6381
Description: The bson_strfreev function in the MongoDB C driver library may be susceptible to an integer overflow where the function will try to free memory at a negative offset. This may result in memory corruption. This issue affected libbson versions prior to 1.26.2
Reference: https://nvd.nist.gov/vuln/detail/CVE-2024-6381
Patch: mongodb/mongo-c-driver@effd95c
Would you help to check if this bug is true? If it's true, I'd like to open a PR for that if necessary. Thank you for your effort and patience!
The text was updated successfully, but these errors were encountered:
Hi,
we have detected that your project may be vulnerable to Integer Overflow to Buffer Overflow in the function of
free_completions
in the file ofsrc/utils/edit.c
. It shares similarities to a recent CVE disclosure CVE-2024-6381 in the mongo-c-driver.The source vulnerability information is as follows:
Would you help to check if this bug is true? If it's true, I'd like to open a PR for that if necessary. Thank you for your effort and patience!
The text was updated successfully, but these errors were encountered: