Libeconf OpenSuse Libeconf

Do you want an email whenever new security vulnerabilities are reported in OpenSuse Libeconf?

By the Year

In 2024 there have been 0 vulnerabilities in OpenSuse Libeconf . Last year Libeconf had 4 security vulnerabilities published. Right now, Libeconf is on track to have less security vulnerabilities in 2024 than it did last year.

Year Vulnerabilities Average Score
2024 0 0.00
2023 4 6.50
2022 0 0.00
2021 0 0.00
2020 0 0.00
2019 0 0.00
2018 0 0.00

It may take a day or so for new Libeconf vulnerabilities to show up in the stats or in the list of recent security vulnerabilties. Additionally vulnerabilities may be tagged under a different product or component name.

Recent OpenSuse Libeconf Security Vulnerabilities

** REJECT ** DO NOT USE THIS CVE RECORD

CVE-2023-30079 - August 22, 2023

** REJECT ** DO NOT USE THIS CVE RECORD. ConsultIDs: CVE-2023-22652. Reason: This record is a duplicate of CVE-2023-22652. Notes: All CVE users should reference CVE-2023-22652 instead of this record. All references and descriptions in this record have been removed to prevent accidental usage.

** REJECT ** DO NOT USE THIS CVE RECORD

CVE-2023-30078 - August 22, 2023

** REJECT ** DO NOT USE THIS CVE RECORD. ConsultIDs: CVE-2023-32181. Reason: This record is a duplicate of CVE-2023-32181. Notes: All CVE users should reference CVE-2023-32181 instead of this record. All references and descriptions in this record have been removed to prevent accidental usage.

A Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') vulnerability in openSUSE libeconf leads to DoS

CVE-2023-22652 6.5 - Medium - June 01, 2023

A Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') vulnerability in openSUSE libeconf leads to DoS via malformed config files. This issue affects libeconf: before 0.5.2.

Classic Buffer Overflow

A Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') vulnerability in openSUSE libeconf

CVE-2023-32181 6.5 - Medium - June 01, 2023

A Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') vulnerability in openSUSE libeconf allows for DoS via malformed configuration files This issue affects libeconf: before 0.5.2.

Classic Buffer Overflow

Stay on top of Security Vulnerabilities

Want an email whenever new vulnerabilities are published for OpenSuse Libeconf or by OpenSuse? Click the Watch button to subscribe.

OpenSuse
Vendor

subscribe