CVE-2023-32181

Name
CVE-2023-32181
Description
A Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') vulnerability in openSUSE libeconf allows for DoS via malformed configuration files This issue affects libeconf: before 0.5.2.
NVD Severity
medium
Other trackers
Mailing lists
Exploits
Forges
GitHub (code, issues), Aports (code, issues)

References

Type URI
MISC https://https://bugzilla.suse.com/show_bug.cgi?id=CVE-2023-32181
MISC https://https://github.com/openSUSE/libeconf/issues/178

Match rules

CPE URI Source package Min version Max version
cpe:2.3:a:opensuse:libeconf:*:*:*:*:*:*:*:* libeconf >= None < 0.5.2

Vulnerable and fixed packages

Source package Branch Version Maintainer Status
libeconf 3.17-main 0.4.7-r0 None possibly vulnerable
libeconf 3.16-main 0.4.4-r0 None possibly vulnerable
libeconf 3.15-main 0.4.2-r0 None possibly vulnerable