Source: libeconf Version: 0.5.1+dfsg1-1 Severity: important Tags: security upstream X-Debbugs-Cc: car...@debian.org, Debian Security Team <t...@security.debian.org>
Hi, The following vulnerabilities were published for libeconf. CVE-2023-32181[0]: | A Buffer Copy without Checking Size of Input ('Classic Buffer | Overflow') vulnerability in openSUSE libeconf allows for DoS via | malformed configuration files This issue affects libeconf: before | 0.5.2. CVE-2023-22652[1]: | A Buffer Copy without Checking Size of Input ('Classic Buffer | Overflow') vulnerability in openSUSE libeconf leads to DoS via | malformed config files. This issue affects libeconf: before 0.5.2. If you fix the vulnerabilities please also make sure to include the CVE (Common Vulnerabilities & Exposures) ids in your changelog entry. For further information see: [0] https://security-tracker.debian.org/tracker/CVE-2023-32181 https://www.cve.org/CVERecord?id=CVE-2023-32181 https://github.com/openSUSE/libeconf/issues/178 [1] https://security-tracker.debian.org/tracker/CVE-2023-22652 https://www.cve.org/CVERecord?id=CVE-2023-22652 https://github.com/openSUSE/libeconf/issues/177 [3] https://github.com/openSUSE/libeconf/commit/8d086dfc69d4299e55e4844e3573b3a4cf420f19 Please adjust the affected versions in the BTS as needed. Regards, Salvatore