In pkgconf through 1.9.3, variable duplication can cause unbounded string expansion due to incorrect checks in libpkgconf/tuple.c:pkgconf_tuple_parse. For example, a .pc file containing a few hundred bytes can expand to one billion bytes.
References
Link | Resource |
---|---|
https://gitea.treehouse.systems/ariadne/pkgconf/commit/628b2b2bafa5d3a2017193ddf375093e70666059 | Patch Third Party Advisory |
https://github.com/pkgconf/pkgconf/tags | Release Notes Third Party Advisory |
https://nullprogram.com/blog/2023/01/18/ | Exploit Third Party Advisory |
https://gitea.treehouse.systems/ariadne/pkgconf/commit/628b2b2bafa5d3a2017193ddf375093e70666059 | Patch Third Party Advisory |
https://github.com/pkgconf/pkgconf/tags | Release Notes Third Party Advisory |
https://nullprogram.com/blog/2023/01/18/ | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 07:47
Type | Values Removed | Values Added |
---|---|---|
References | () https://gitea.treehouse.systems/ariadne/pkgconf/commit/628b2b2bafa5d3a2017193ddf375093e70666059 - Patch, Third Party Advisory | |
References | () https://github.com/pkgconf/pkgconf/tags - Release Notes, Third Party Advisory | |
References | () https://nullprogram.com/blog/2023/01/18/ - Exploit, Third Party Advisory |
Information
Published : 2023-01-22 04:15
Updated : 2024-11-21 07:47
NVD link : CVE-2023-24056
Mitre link : CVE-2023-24056
CVE.ORG link : CVE-2023-24056
JSON object : View
Products Affected
pkgconf
- pkgconf
CWE