Impact
Uncrustify contains a local buffer overflow in the check_template function, triggered during token cleanup in check_template.cpp. A crafted input supplied by a user who can invoke the uncrustify executable can overflow the buffer, corrupt contiguous memory and cause the process to abort. The resulting crash constitutes a denial of service that can interrupt code formatting workflows or continuous‑integration jobs that depend on Uncrustify.
Affected Systems
The vulnerability exists in Uncrustify releases that include the code identified by the hash bcc41cbdc (v.Uncrustify_d-0.82.0-132) and any earlier revisions that have not incorporated the patch commit 68e67b9a1435a1bb173b106fedb4a4f510972bdc. Any build that does not contain this commit is vulnerable.
Risk and Exploitability
The CVSS score of 6.2 reflects moderate severity, but the exploitation requires local access to run the uncrustify binary; remote exploitation is not possible. EPSS data is unavailable, so the probability of exploitation cannot be quantified. The vulnerability is not listed in the CISA KEV catalog, indicating no confirmed public exploitation. Nonetheless, a local attacker supplying crafted input can reliably terminate the tool, potentially disrupting pipeline execution or library formatting tasks.
OpenCVE Enrichment