This issue affects libeconf: before 0.5.2.
Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-36449 | A Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') vulnerability in openSUSE libeconf allows for DoS via malformed configuration files This issue affects libeconf: before 0.5.2. |
Fri, 10 Jan 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
| |
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: suse
Published:
Updated: 2025-01-10T18:39:46.673Z
Reserved: 2023-05-04T08:30:59.320Z
Link: CVE-2023-32181
Updated: 2024-08-02T15:10:24.595Z
Status : Modified
Published: 2023-06-01T12:15:09.727
Modified: 2025-01-10T19:15:36.570
Link: CVE-2023-32181
OpenCVE Enrichment
No data.
EUVD