First published: Sun Jan 22 2023(Updated: )
In pkgconf through 1.9.3, variable duplication can cause unbounded string expansion due to incorrect checks in libpkgconf/tuple.c:pkgconf_tuple_parse. For example, a .pc file containing a few hundred bytes can expand to one billion bytes.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Pkgconf | <=1.9.3 |
https://gitea.treehouse.systems/ariadne/pkgconf/commit/628b2b2bafa5d3a2017193ddf375093e70666059
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-24056 has been evaluated as having a high severity due to the potential for unbounded string expansion.
To mitigate CVE-2023-24056, upgrade to pkgconf version 1.9.4 or later.
CVE-2023-24056 is a vulnerability related to variable duplication causing unbounded string expansion.
Pkgconf versions up to and including 1.9.3 are affected by CVE-2023-24056.
Exploitation of CVE-2023-24056 can lead to significant resource consumption, potentially crashing the application due to excessive memory usage.