CVE-2023-30078
Summary
| CVE | CVE-2023-30078 |
| State | REJECT |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2023-08-22 19:16:00 UTC |
| Updated | 2023-11-07 04:13:00 UTC |
| Description | ** REJECT ** DO NOT USE THIS CVE RECORD. ConsultIDs: CVE-2023-32181. Reason: This record is a duplicate of CVE-2023-32181. Notes: All CVE users should reference CVE-2023-32181 instead of this record. All references and descriptions in this record have been removed to prevent accidental usage. |
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|
| Application |
Opensuse |
Libeconf |
0.5.1 |
All |
All |
All |
References
| Reference | Source | Link | Tags |
|---|
| github.com/yangjiageng/PoC/blob/master/libeconf-PoC/econf_writeFile_546 |
MISC |
github.com |
|
| raw.githubusercontent.com/yangjiageng/PoC/master/libeconf-PoC/tst-write-string-data.c |
MISC |
raw.githubusercontent.com |
|
| libeconf: A stack-buffer-overflow vulnerability in "econf_writeFile" function · Issue #178 · openSUSE/libeconf · GitHub |
MISC |
github.com |
|
| CVE Program record |
CVE.ORG |
www.cve.org |
canonical |
| NVD vulnerability detail |
NVD |
nvd.nist.gov |
canonical, analysis |
No vendor comments have been submitted for this CVE.
Legacy QID Mappings
- 755015 SUSE Enterprise Linux Security Update for libeconf (SUSE-SU-2023:3954-1)