A Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') vulnerability in openSUSE libeconf allows for DoS via malformed configuration files. This issue affects libeconf: before 0.5.2. References: https://github.com/openSUSE/libeconf/issues/178 https://bugzilla.suse.com/show_bug.cgi?id=CVE-2023-32181 Upstream patch: https://github.com/openSUSE/libeconf/pull/183
Created libeconf tracking bugs for this issue: Affects: fedora-all [bug 2212466]
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2023-32181