CVE-2023-22652

Name
CVE-2023-22652
Description
A Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') vulnerability in openSUSE libeconf leads to DoS via malformed config files. This issue affects libeconf: before 0.5.2.
NVD Severity
medium
Other trackers
Mailing lists
Exploits
Forges
GitHub (code, issues), Aports (code, issues)

References

Type URI
MISC https://bugzilla.suse.com/show_bug.cgi?id=CVE-2023-22652
MISC https://https://github.com/openSUSE/libeconf/issues/177
MISC https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SMG5256D5I3GFA3RBAJQ2WYPJDYAIL74/
MISC https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SDD5GL5T3V5XZ3VFA4HPE6YGJ2K4HHPC/
MISC https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YAYW7X753Z6GOJKVLQPXBDHISN6ZT233/

Match rules

CPE URI Source package Min version Max version
cpe:2.3:a:opensuse:libeconf:*:*:*:*:*:*:*:* libeconf >= None < 0.5.2

Vulnerable and fixed packages

Source package Branch Version Maintainer Status
libeconf 3.17-main 0.4.7-r0 None possibly vulnerable
libeconf 3.16-main 0.4.4-r0 None possibly vulnerable
libeconf 3.15-main 0.4.2-r0 None possibly vulnerable