| Summary | An integer overflow vulnerability in the simdjson document-builder API allows incorrect buffer size calculations in "string_builder::escape_and_append()" when processing very large input strings on platforms with limited "size_t" width (e.g., 32-bit builds). The overflow can cause insufficient buffer allocation, leading to out-of-bounds memory reads in SIMD routines and potentially resulting in information disclosure, memory corruption, or malformed JSON output. |
|---|---|
| Publication Date | May 14, 2026, 8:16 p.m. |
| Registration Date | May 15, 2026, 4:24 a.m. |
| Last Update | May 15, 2026, 1:04 a.m. |