Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2023-32181

Опубликовано: 01 июн. 2023
Источник: debian
EPSS Низкий

Описание

A Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') vulnerability in openSUSE libeconf allows for DoS via malformed configuration files This issue affects libeconf: before 0.5.2.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
libeconffixed0.5.2+dfsg1-1package
libeconffixed0.5.1+dfsg1-1+deb12u1bookwormpackage
libeconfnot-affectedbullseyepackage

Примечания

  • https://github.com/openSUSE/libeconf/issues/178

  • https://github.com/openSUSE/libeconf/commit/8d086dfc69d4299e55e4844e3573b3a4cf420f19 (v0.5.2)

  • Patch overlaps with patch for CVE-2023-22652.

EPSS

Процентиль: 20%
0.00063
Низкий

Связанные уязвимости

CVSS3: 3.3
ubuntu
больше 2 лет назад

A Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') vulnerability in openSUSE libeconf allows for DoS via malformed configuration files This issue affects libeconf: before 0.5.2.

CVSS3: 6.5
redhat
почти 3 года назад

A Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') vulnerability in openSUSE libeconf allows for DoS via malformed configuration files This issue affects libeconf: before 0.5.2.

CVSS3: 3.3
nvd
больше 2 лет назад

A Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') vulnerability in openSUSE libeconf allows for DoS via malformed configuration files This issue affects libeconf: before 0.5.2.

CVSS3: 3.3
github
больше 2 лет назад

A Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') vulnerability in openSUSE libeconf allows for DoS via malformed configuration files This issue affects libeconf: before 0.5.2.

suse-cvrf
больше 2 лет назад

Security update for libeconf

EPSS

Процентиль: 20%
0.00063
Низкий