Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2023-4347

Опубликовано: 02 авг. 2023
Источник: oracle-oval
Платформа: Oracle Linux 9

Описание

ELSA-2023-4347: libeconf security update (MODERATE)

[0.4.1-3]

  • Fix stack-based buffer overflow in read_file(). Resolves: #2212467 (CVE-2023-22652)

Обновленные пакеты

Oracle Linux 9

Oracle Linux aarch64

libeconf

0.4.1-3.el9_2

Oracle Linux x86_64

libeconf

0.4.1-3.el9_2

Связанные CVE

Связанные уязвимости

CVSS3: 3.3
ubuntu
около 2 лет назад

A Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') vulnerability in openSUSE libeconf leads to DoS via malformed config files. This issue affects libeconf: before 0.5.2.

CVSS3: 6.5
redhat
больше 2 лет назад

A Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') vulnerability in openSUSE libeconf leads to DoS via malformed config files. This issue affects libeconf: before 0.5.2.

CVSS3: 3.3
nvd
около 2 лет назад

A Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') vulnerability in openSUSE libeconf leads to DoS via malformed config files. This issue affects libeconf: before 0.5.2.

CVSS3: 3.3
debian
около 2 лет назад

A Buffer Copy without Checking Size of Input ('Classic Buffer Overflow ...

CVSS3: 3.3
github
около 2 лет назад

A Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') vulnerability in openSUSE libeconf leads to DoS via malformed config files. This issue affects libeconf: before 0.5.2.