A Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') vulnerability in openSUSE libeconf leads to DoS via malformed config files.
This issue affects libeconf: before 0.5.2.
Metrics
Affected Vendors & Products
References
History
Thu, 13 Feb 2025 17:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') vulnerability in openSUSE libeconf leads to DoS via malformed config files. This issue affects libeconf: before 0.5.2. | A Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') vulnerability in openSUSE libeconf leads to DoS via malformed config files. This issue affects libeconf: before 0.5.2. |
Fri, 10 Jan 2025 19:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
| |
Metrics |
ssvc
|

Status: PUBLISHED
Assigner: suse
Published: 2023-06-01T11:51:15.111Z
Updated: 2025-02-13T16:44:02.309Z
Reserved: 2023-01-05T10:40:08.607Z
Link: CVE-2023-22652

Updated: 2024-08-02T10:13:49.854Z

Status : Modified
Published: 2023-06-01T12:15:09.557
Modified: 2025-02-13T17:16:07.560
Link: CVE-2023-22652
