This issue affects libeconf: before 0.5.2.
Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-4164-1 | libeconf security update |
EUVD |
EUVD-2023-26782 | A Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') vulnerability in openSUSE libeconf leads to DoS via malformed config files. This issue affects libeconf: before 0.5.2. |
Tue, 13 May 2025 01:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Thu, 13 Feb 2025 17:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') vulnerability in openSUSE libeconf leads to DoS via malformed config files. This issue affects libeconf: before 0.5.2. | A Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') vulnerability in openSUSE libeconf leads to DoS via malformed config files. This issue affects libeconf: before 0.5.2. |
Fri, 10 Jan 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
| |
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: suse
Published:
Updated: 2025-05-13T00:11:54.972Z
Reserved: 2023-01-05T10:40:08.607Z
Link: CVE-2023-22652
Updated: 2024-08-02T10:13:49.854Z
Status : Modified
Published: 2023-06-01T12:15:09.557
Modified: 2025-05-13T01:15:46.230
Link: CVE-2023-22652
OpenCVE Enrichment
No data.
Debian DLA
EUVD