Download
| Alert*
oval:org.secpod.oval:def:89049806
This update for libeconf fixes the following issues: Update to version 0.5.2. * CVE-2023-30078, CVE-2023-32181: Fixed a stack-buffer-overflow vulnerability in "econf_writeFile" function . * CVE-2023-30079, CVE-2023-22652: Fixed a stack-buffer-overflow vulnerability in "read_file" function oval:org.secpod.oval:def:1506840 [0.4.1-3] - Fix stack-based buffer overflow in read_file. Resolves: #2212467 oval:org.secpod.oval:def:507877 Libeconf is a highly flexible and configurable library to parse and manage key=value configuration files. It reads configuration file snippets from different directories and builds the final configuration file from it. Security Fix: * libeconf: stack-based buffer overflow in read_file in lib/getfile ... oval:org.secpod.oval:def:126131 libeconf is a highly flexible and configurable library to parse and manage key=value configuration files. It reads configuration file snippets from different directories and builds the final configuration file from it. oval:org.secpod.oval:def:2600299 Libeconf is a highly flexible and configurable library to parse and manage key=value configuration files. It reads configuration file snippets from different directories and builds the final configuration file from it. oval:org.secpod.oval:def:5800204 Libeconf is a highly flexible and configurable library to parse and manage key=value configuration files. It reads configuration file snippets from different directories and builds the final configuration file from it. Security Fix: * libeconf: stack-based buffer overflow in read_file in lib/getfile ... oval:org.secpod.oval:def:3301874 Security update for libeconf oval:org.secpod.oval:def:126079 libeconf is a highly flexible and configurable library to parse and manage key=value configuration files. It reads configuration file snippets from different directories and builds the final configuration file from it. oval:org.secpod.oval:def:19500266 A Buffer Copy without Checking Size of Input vulnerability in openSUSE libeconf leads to DoS via malformed config files.This issue affects libeconf: before 0.5.2. A Buffer Copy without Checking Size of Input vulnerability in openSUSE libeconf allows for DoS via malformed configuration filesThis is ... |