{"id":"CVE-2022-27819","details":"SWHKD 1.1.5 allows unsafe parsing via the -c option. An information leak might occur but there is a simple denial of service (memory exhaustion) upon an attempt to parse a large or infinite file (such as a block or character device).","aliases":["GHSA-h6xw-mghq-7523"],"modified":"2026-02-21T07:41:37.702777Z","published":"2022-04-07T02:15:07.257Z","references":[{"type":"ADVISORY","url":"http://www.openwall.com/lists/oss-security/2022/04/14/1"},{"type":"ADVISORY","url":"https://github.com/waycrate/swhkd/commit/b4e6dc76f4845ab03104187a42ac6d1bbc1e0021"},{"type":"ADVISORY","url":"https://github.com/waycrate/swhkd/releases"},{"type":"FIX","url":"http://www.openwall.com/lists/oss-security/2022/04/14/1"},{"type":"FIX","url":"https://github.com/waycrate/swhkd/commit/b4e6dc76f4845ab03104187a42ac6d1bbc1e0021"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/waycrate/swhkd","events":[{"introduced":"0"},{"fixed":"b4e6dc76f4845ab03104187a42ac6d1bbc1e0021"}]}],"versions":["1.1.2","1.1.4","1.1.5","1.1.7","v1.0.0"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-27819.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:H"}]}