CVE-2023-30079
Summary
| CVE | CVE-2023-30079 |
| State | REJECT |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2023-08-22 19:16:00 UTC |
| Updated | 2023-11-07 04:13:00 UTC |
| Description | ** REJECT ** DO NOT USE THIS CVE RECORD. ConsultIDs: CVE-2023-22652. Reason: This record is a duplicate of CVE-2023-22652. Notes: All CVE users should reference CVE-2023-22652 instead of this record. All references and descriptions in this record have been removed to prevent accidental usage. |
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|
| Application |
Opensuse |
Libeconf |
0.5.1 |
All |
All |
All |
References
| Reference | Source | Link | Tags |
|---|
| [SECURITY] Fedora 38 Update: libeconf-0.5.2-1.fc38 - package-announce - Fedora Mailing-Lists |
FEDORA |
lists.fedoraproject.org |
|
| [SECURITY] Fedora 39 Update: libeconf-0.5.2-1.fc39 - package-announce - Fedora Mailing-Lists |
FEDORA |
lists.fedoraproject.org |
|
| [SECURITY] Fedora 37 Update: libeconf-0.5.2-1.fc37 - package-announce - Fedora Mailing-Lists |
FEDORA |
lists.fedoraproject.org |
|
| PoC/libeconf-PoC/read_file_503 at master · yangjiageng/PoC · GitHub |
MISC |
github.com |
|
| libeconf: A stack-buffer-overflow vulnerability in "read_file" function · Issue #177 · openSUSE/libeconf · GitHub |
MISC |
github.com |
|
| raw.githubusercontent.com/yangjiageng/PoC/master/libeconf-PoC/tst-logindefs1.c |
MISC |
raw.githubusercontent.com |
|
| CVE Program record |
CVE.ORG |
www.cve.org |
canonical |
| NVD vulnerability detail |
NVD |
nvd.nist.gov |
canonical, analysis |
No vendor comments have been submitted for this CVE.
Legacy QID Mappings
- 242110 Red Hat Update for libeconf (RHSA-2023:5458)
- 755015 SUSE Enterprise Linux Security Update for libeconf (SUSE-SU-2023:3954-1)
- 961039 Rocky Linux Security Update for libeconf (RLSA-2023:4347)