Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2024-53849

Опубликовано: 27 нояб. 2024
Источник: debian
EPSS Низкий

Описание

editorconfig-core-c is theEditorConfig core library written in C (for use by plugins supporting EditorConfig parsing). In affected versions several overflows may occur in switch case '[' when the input pattern contains many escaped characters. The added backslashes leave too little space in the output pattern when processing nested brackets such that the remaining input length exceeds the output capacity. This issue has been addressed in release version 0.12.7. Users are advised to upgrade. There are no known workarounds for this vulnerability.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
editorconfig-corefixed0.12.7-0.1package
editorconfig-coreno-dsabookwormpackage

Примечания

  • https://github.com/editorconfig/editorconfig-core-c/security/advisories/GHSA-475j-wc37-6274

  • https://github.com/editorconfig/editorconfig-core-c/pull/103

  • https://github.com/editorconfig/editorconfig-core-c/commit/4d5518a0a4e4910c37281ab13a048d0d86999782 (v0.12.7)

  • https://github.com/editorconfig/editorconfig-core-c/commit/fca7cf19e0fb800c2d38f173c1f69ad40bf2a2f5 (v0.12.7)

EPSS

Процентиль: 29%
0.00105
Низкий

Связанные уязвимости

ubuntu
около 1 года назад

editorconfig-core-c is theEditorConfig core library written in C (for use by plugins supporting EditorConfig parsing). In affected versions several overflows may occur in switch case '[' when the input pattern contains many escaped characters. The added backslashes leave too little space in the output pattern when processing nested brackets such that the remaining input length exceeds the output capacity. This issue has been addressed in release version 0.12.7. Users are advised to upgrade. There are no known workarounds for this vulnerability.

nvd
около 1 года назад

editorconfig-core-c is theEditorConfig core library written in C (for use by plugins supporting EditorConfig parsing). In affected versions several overflows may occur in switch case '[' when the input pattern contains many escaped characters. The added backslashes leave too little space in the output pattern when processing nested brackets such that the remaining input length exceeds the output capacity. This issue has been addressed in release version 0.12.7. Users are advised to upgrade. There are no known workarounds for this vulnerability.

suse-cvrf
около 1 года назад

Security update for editorconfig-core-c

CVSS3: 5.3
fstec
около 1 года назад

Уязвимость библиотеки EditorConfig core С языка программирования C, связанная с переполнением буфера в стеке, позволяющая нарушителю вызвать отказ в обслуживании

EPSS

Процентиль: 29%
0.00105
Низкий