一、 漏洞 CVE-2025-6140 基础信息
漏洞信息
                                        神龙正在分析中.
                                        
提示
尽管我们采用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。
神龙会尽力确保数据准确,但也请结合实际情况进行甄别与判断。
神龙祝您一切顺利!
漏洞标题
spdlog pattern_formatter-inl.h scoped_padder resource consumption
来源:美国国家漏洞数据库 NVD
漏洞描述信息
A vulnerability, which was classified as problematic, was found in spdlog up to 1.15.1. This affects the function scoped_padder in the library include/spdlog/pattern_formatter-inl.h. The manipulation leads to resource consumption. It is possible to launch the attack on the local host. The exploit has been disclosed to the public and may be used. Upgrading to version 1.15.2 is able to address this issue. The identifier of the patch is 10320184df1eb4638e253a34b1eb44ce78954094. It is recommended to upgrade the affected component.
来源:美国国家漏洞数据库 NVD
CVSS信息
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
来源:美国国家漏洞数据库 NVD
漏洞类别
未加控制的资源消耗(资源穷尽)
来源:美国国家漏洞数据库 NVD
二、漏洞 CVE-2025-6140 的公开POC
# POC 描述 源链接 神龙链接
三、漏洞 CVE-2025-6140 的情报信息
  • 标题: [BUG] Allocation-size-too-big in `format_fuzzer` · Issue #3360 · gabime/spdlog -- 🔗来源链接

    标签: exploit issue-tracking

  • 标题: [BUG] Allocation-size-too-big in `format_fuzzer` · Issue #3360 · gabime/spdlog -- 🔗来源链接

    标签: issue-tracking

  • 标题: Fixed issue #3360 (#3361) · gabime/spdlog@1032018 · GitHub -- 🔗来源链接

    标签: patch

  • 标题: Release Version 1.15.2 · gabime/spdlog · GitHub -- 🔗来源链接

    标签: patch

  • 标题: Login required -- 🔗来源链接

    标签: signature permissions-required

  • 标题: CVE-2025-6140 spdlog pattern_formatter-inl.h scoped_padder resource consumption (Issue 3360) -- 🔗来源链接

    标签: vdb-entry technical-description

  • 标题: Submit #592999: spdlog spdlog 1.15.1 (commit 3335c38) Uncontrolled Memory Allocation -- 🔗来源链接

    标签: third-party-advisory

  • https://nvd.nist.gov/vuln/detail/CVE-2025-6140