Metrics
Affected Vendors & Products
Fri, 19 Dec 2025 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 19 Dec 2025 17:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A security flaw has been discovered in floooh sokol up to 33e2271c431bf21de001e972f72da17a984da932. This vulnerability affects the function _sg_pipeline_common_init in the library sokol_gfx.h. Performing manipulation results in heap-based buffer overflow. The attack needs to be approached locally. The exploit has been released to the public and may be exploited. This product uses a rolling release model to deliver continuous updates. As a result, specific version information for affected or updated releases is not available. The patch is named 33e2271c431bf21de001e972f72da17a984da932. It is suggested to install a patch to address this issue. | |
| Title | floooh sokol sokol_gfx.h _sg_pipeline_common_init heap-based overflow | |
| Weaknesses | CWE-119 CWE-122 |
|
| References |
|
|
| Metrics |
cvssV2_0
|
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2025-12-19T17:50:45.452Z
Reserved: 2025-12-19T09:09:18.085Z
Link: CVE-2025-14958
Updated: 2025-12-19T17:50:39.942Z
Status : Received
Published: 2025-12-19T18:15:48.373
Modified: 2025-12-19T18:15:48.373
Link: CVE-2025-14958
No data.
OpenCVE Enrichment
No data.