CVE-2023-24056
Published on: Not Yet Published
Last Modified on: 01/23/2023 03:08:00 PM UTC
The following vulnerability was found:
In pkgconf through 1.9.3, variable duplication can cause unbounded string expansion due to incorrect checks in libpkgconf/tuple.c:pkgconf_tuple_parse. For example, a .pc file containing a few hundred bytes can expand to one billion bytes.
- CVE-2023-24056 has been assigned by
[email protected] to track the vulnerability
CVE References
Description | Tags ⓘ | Link |
---|---|---|
Tags · pkgconf/pkgconf · GitHub | github.com text/html |
![]() |
u-config: a new, lean pkg-config clone | nullprogram.com text/html |
![]() |
tuple: test for, and stop string processing, on truncation · 628b2b2baf - pkgconf - Treehouse Gitea | gitea.treehouse.systems text/html |
![]() |
Related QID Numbers
There are no known software configurations (CPEs) currently associated with this CVE
No vendor comments have been submitted for this CVE
Social Mentions
Source | Title | Posted (UTC) |
---|---|---|
![]() |
CVE-2023-24056 : In pkgconf through 1.9.3, variable duplication can cause unbounded string expansion due to incorre… twitter.com/i/web/status/1… | 2023-01-22 04:07:39 |
![]() |
CVE-2023-24056 | pkgconf up to 1.9.3 PC File libpkgconf/tuple.c pkgconf_tuple_parse denial of service A vulnerabili… twitter.com/i/web/status/1… | 2023-01-22 11:50:34 |
![]() |
Pkgconf, CVE-2023-24056 and disinformation | 2023-01-24 13:15:29 |