Bug 2165034 (CVE-2023-24056) - CVE-2023-24056 pkgconf: unbounded string expansion due to incorrect checks may result in buffer overflow
Summary: CVE-2023-24056 pkgconf: unbounded string expansion due to incorrect checks ma...
Keywords:
Status: NEW
Alias: CVE-2023-24056
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
low
low
Target Milestone: ---
Assignee: Nobody
QA Contact:
URL:
Whiteboard:
Depends On: 2165035 2165039 2165040
Blocks: 2164615
TreeView+ depends on / blocked
 
Reported: 2023-01-27 13:17 UTC by Marian Rehak
Modified: 2023-10-04 12:29 UTC (History)
1 user (show)

Fixed In Version: pkgconf 1.9.4
Doc Type: If docs needed, set a value
Doc Text:
A flaw was found in pkgconf, where a variable duplication can cause unbounded string expansion due to incorrect checks in libpkgconf/tuple.c:pkgconf_tuple_parse. This issue may lead to a buffer overflow, which can crash the software.
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)

Description Marian Rehak 2023-01-27 13:17:34 UTC
Variable duplication can cause unbounded string expansion due to incorrect checks in libpkgconf/tuple.c:pkgconf_tuple_parse. For example, a .pc file containing a few hundred bytes can expand to one billion bytes.

Comment 1 Marian Rehak 2023-01-27 13:17:54 UTC
Created pkgconf tracking bugs for this issue:

Affects: fedora-all [bug 2165035]


Note You need to log in before you can comment on or make changes to this bug.