Vulnerability Details : CVE-2023-24056
In pkgconf through 1.9.3, variable duplication can cause unbounded string expansion due to incorrect checks in libpkgconf/tuple.c:pkgconf_tuple_parse. For example, a .pc file containing a few hundred bytes can expand to one billion bytes.
Products affected by CVE-2023-24056
- cpe:2.3:a:pkgconf:pkgconf:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2023-24056
0.08%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 37 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2023-24056
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.5
|
MEDIUM | CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H |
1.8
|
3.6
|
NIST |
References for CVE-2023-24056
-
https://gitea.treehouse.systems/ariadne/pkgconf/commit/628b2b2bafa5d3a2017193ddf375093e70666059
tuple: test for, and stop string processing, on truncation · 628b2b2baf - pkgconf - Treehouse GiteaPatch;Third Party Advisory
-
https://github.com/pkgconf/pkgconf/tags
Tags · pkgconf/pkgconf · GitHubRelease Notes;Third Party Advisory
-
https://nullprogram.com/blog/2023/01/18/
u-config: a new, lean pkg-config cloneExploit;Third Party Advisory
Jump to