Bug 2253969 (CVE-2023-49287) - CVE-2023-49287 tinydir: stack-based buffer overflow in tinydir_file_open()
Summary: CVE-2023-49287 tinydir: stack-based buffer overflow in tinydir_file_open()
Keywords:
Status: NEW
Alias: CVE-2023-49287
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
high
high
Target Milestone: ---
Assignee: Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 2253971 2253970
Blocks:
TreeView+ depends on / blocked
 
Reported: 2023-12-11 10:40 UTC by TEJ RATHI
Modified: 2023-12-11 10:40 UTC (History)
0 users

Fixed In Version: tinydir 1.2.6
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)

Description TEJ RATHI 2023-12-11 10:40:33 UTC
TinyDir is a lightweight C directory and file reader. Buffer overflows in the `tinydir_file_open()` function. This vulnerability has been patched in version 1.2.6.

http://packetstormsecurity.com/files/176060/TinyDir-1.2.5-Buffer-Overflow.html
http://www.openwall.com/lists/oss-security/2023/12/04/1
https://github.com/cxong/tinydir/releases/tag/1.2.6
https://github.com/cxong/tinydir/security/advisories/GHSA-jf5r-wgf4-qhxf

Comment 1 TEJ RATHI 2023-12-11 10:40:54 UTC
Created tinydir tracking bugs for this issue:

Affects: epel-all [bug 2253971]
Affects: fedora-all [bug 2253970]


Note You need to log in before you can comment on or make changes to this bug.