A Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') vulnerability in openSUSE libeconf allows for DoS via malformed configuration files
This issue affects libeconf: before 0.5.2.
References
Link | Resource |
---|---|
https://github.com/openSUSE/libeconf/issues/178 | |
https://https://bugzilla.suse.com/show_bug.cgi?id=CVE-2023-32181 | Broken Link Issue Tracking Vendor Advisory |
https://https://bugzilla.suse.com/show_bug.cgi?id=CVE-2023-32181 | Broken Link Issue Tracking Vendor Advisory |
https://https://github.com/openSUSE/libeconf/issues/178 | Broken Link Issue Tracking Vendor Advisory |
https://https://github.com/openSUSE/libeconf/issues/178 | Broken Link Issue Tracking Vendor Advisory |
Configurations
History
10 Jan 2025, 19:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
References | () https://https://bugzilla.suse.com/show_bug.cgi?id=CVE-2023-32181 - Broken Link, Issue Tracking, Vendor Advisory | |
References | () https://https://github.com/openSUSE/libeconf/issues/178 - Broken Link, Issue Tracking, Vendor Advisory | |
CWE |
08 Jun 2023, 18:29
Type | Values Removed | Values Added |
---|---|---|
First Time |
Opensuse
Opensuse libeconf |
|
CPE | cpe:2.3:a:opensuse:libeconf:*:*:*:*:*:*:*:* | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.5 |
References | (MISC) https://https://github.com/openSUSE/libeconf/issues/178 - Broken Link, Issue Tracking, Vendor Advisory | |
References | (MISC) https://https://bugzilla.suse.com/show_bug.cgi?id=CVE-2023-32181 - Broken Link, Issue Tracking, Vendor Advisory |
01 Jun 2023, 13:00
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-06-01 12:15
Updated : 2025-01-10 19:15
NVD link : CVE-2023-32181
Mitre link : CVE-2023-32181
JSON object : View
Products Affected
opensuse
- libeconf
CWE
No CWE.