A Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') vulnerability in openSUSE libeconf leads to DoS via malformed config files.
This issue affects libeconf: before 0.5.2.
References
Configurations
History
13 May 2025, 01:15
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
13 Feb 2025, 17:16
| Type | Values Removed | Values Added |
|---|---|---|
| Summary | A Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') vulnerability in openSUSE libeconf leads to DoS via malformed config files. This issue affects libeconf: before 0.5.2. |
10 Jan 2025, 19:15
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
|
| References | () https://https://github.com/openSUSE/libeconf/issues/177 - Broken Link | |
| References | () https://bugzilla.suse.com/show_bug.cgi?id=CVE-2023-22652 - Issue Tracking, Vendor Advisory | |
| CWE |
08 Jun 2023, 18:29
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.5 |
08 Jun 2023, 17:51
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Opensuse
Opensuse libeconf |
|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
| CPE | cpe:2.3:a:opensuse:libeconf:*:*:*:*:*:*:*:* | |
| References | (MISC) https://https://github.com/openSUSE/libeconf/issues/177 - Broken Link | |
| References | (MISC) https://bugzilla.suse.com/show_bug.cgi?id=CVE-2023-22652 - Issue Tracking, Vendor Advisory |
01 Jun 2023, 13:00
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2023-06-01 12:15
Updated : 2025-05-13 01:15
NVD link : CVE-2023-22652
Mitre link : CVE-2023-22652
JSON object : View
Products Affected
opensuse
- libeconf
CWE
No CWE.
