Описание
ELSA-2023-4347: libeconf security update (MODERATE)
[0.4.1-3]
- Fix stack-based buffer overflow in read_file(). Resolves: #2212467 (CVE-2023-22652)
Обновленные пакеты
Oracle Linux 9
Oracle Linux aarch64
libeconf
0.4.1-3.el9_2
Oracle Linux x86_64
libeconf
0.4.1-3.el9_2
Связанные CVE
Связанные уязвимости
A Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') vulnerability in openSUSE libeconf leads to DoS via malformed config files. This issue affects libeconf: before 0.5.2.
A Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') vulnerability in openSUSE libeconf leads to DoS via malformed config files. This issue affects libeconf: before 0.5.2.
A Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') vulnerability in openSUSE libeconf leads to DoS via malformed config files. This issue affects libeconf: before 0.5.2.
A Buffer Copy without Checking Size of Input ('Classic Buffer Overflow ...
A Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') vulnerability in openSUSE libeconf leads to DoS via malformed config files. This issue affects libeconf: before 0.5.2.