-
Notifications
You must be signed in to change notification settings - Fork 107
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Vulnerability Disclosure #164
Comments
Hi @whitesquirrell , make sense, but unfortunately does not possible to produce buffer overflow via the proposed exploit. |
Hi @DmitriyEshenko, noted. Since the corruption occurs during the exit process, will you still patch the code? |
Sure, we definitely will patch code and open CVE but need time, I guess around 2 weeks |
Hi @DmitriyEshenko, may I know if the code is patched? |
Looks like this got CVE-2022-0982, but was it fixed? |
Dear accel-ppp Development Team,
I have filed a vulnerability disclosure by email to dev@accel-ppp.org. Please let me know when it is patched and we can use this issue for tracking purposes.
Thanks!
The text was updated successfully, but these errors were encountered: