Описание
Rejected reason: DO NOT USE THIS CVE RECORD. ConsultIDs: CVE-2023-22652. Reason: This record is a duplicate of CVE-2023-22652. Notes: All CVE users should reference CVE-2023-22652 instead of this record. All references and descriptions in this record have been removed to prevent accidental usage.
Релиз | Статус | Примечание |
---|---|---|
bionic | ignored | end of standard support |
devel | not-affected | 0.5.2+dfsg1-1 |
esm-apps/jammy | not-affected | |
esm-infra/focal | DNE | |
focal | DNE | |
jammy | not-affected | |
lunar | ignored | end of life, was needs-triage |
mantic | not-affected | 0.5.2+dfsg1-1 |
trusty | ignored | end of standard support |
upstream | released | 0.5.2+dfsg1-1 |
Показывать по
Ссылки на источники
Связанные уязвимости
A flaw was found in the libeconf library. This issue occurs when parsing a specially crafted configuration file, causing a stack-based buffer overflow that results in a denial of service.
Rejected reason: DO NOT USE THIS CVE RECORD. ConsultIDs: CVE-2023-22652. Reason: This record is a duplicate of CVE-2023-22652. Notes: All CVE users should reference CVE-2023-22652 instead of this record. All references and descriptions in this record have been removed to prevent accidental usage.
A stack overflow vulnerability exists in function read_file in atlibeconf/lib/getfilecontents.c in libeconf 0.5.1 allows attackers to cause a Denial of service or execute arbitrary code.
Уязвимость функции read_file() библиотеки для анализа и управления файлами конфигурации libeconf, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код