Описание
A Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') vulnerability in openSUSE libeconf leads to DoS via malformed config files. This issue affects libeconf: before 0.5.2.
Релиз | Статус | Примечание |
---|---|---|
bionic | ignored | end of standard support |
devel | needs-triage | |
esm-apps/jammy | needs-triage | |
esm-apps/noble | needs-triage | |
esm-infra/focal | DNE | |
focal | DNE | |
jammy | needs-triage | |
kinetic | ignored | end of life, was needs-triage |
lunar | ignored | end of life, was needs-triage |
mantic | ignored | end of life, was needs-triage |
Показывать по
EPSS
3.3 Low
CVSS3
Связанные уязвимости
A Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') vulnerability in openSUSE libeconf leads to DoS via malformed config files. This issue affects libeconf: before 0.5.2.
A Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') vulnerability in openSUSE libeconf leads to DoS via malformed config files. This issue affects libeconf: before 0.5.2.
A Buffer Copy without Checking Size of Input ('Classic Buffer Overflow ...
A Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') vulnerability in openSUSE libeconf leads to DoS via malformed config files. This issue affects libeconf: before 0.5.2.
EPSS
3.3 Low
CVSS3