First published: Wed Dec 18 2024(Updated: )
It was discovered that EditorConfig improperly managed memory when handling certain inputs, leading to overflows. An attacker could possibly use these issues to cause a denial of service, or execute arbitrary code.
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/editorconfig | <0.12.5-2ubuntu0.1~esm2 | 0.12.5-2ubuntu0.1~esm2 |
Ubuntu Ubuntu | =22.04 | |
All of | ||
ubuntu/libeditorconfig0 | <0.12.5-2ubuntu0.1~esm2 | 0.12.5-2ubuntu0.1~esm2 |
Ubuntu Ubuntu | =22.04 | |
All of | ||
ubuntu/editorconfig | <0.12.1-1.1+deb11u1build0.20.04.1 | 0.12.1-1.1+deb11u1build0.20.04.1 |
Ubuntu Ubuntu | =20.04 | |
All of | ||
ubuntu/libeditorconfig0 | <0.12.1-1.1+deb11u1build0.20.04.1 | 0.12.1-1.1+deb11u1build0.20.04.1 |
Ubuntu Ubuntu | =20.04 | |
All of | ||
ubuntu/editorconfig | <0.12.1-1.1ubuntu0.18.04.1~esm2 | 0.12.1-1.1ubuntu0.18.04.1~esm2 |
Ubuntu Ubuntu | =18.04 | |
All of | ||
ubuntu/libeditorconfig0 | <0.12.1-1.1ubuntu0.18.04.1~esm2 | 0.12.1-1.1ubuntu0.18.04.1~esm2 |
Ubuntu Ubuntu | =18.04 | |
All of | ||
ubuntu/editorconfig | <0.12.0-2ubuntu0.1~esm2 | 0.12.0-2ubuntu0.1~esm2 |
Ubuntu Ubuntu | =16.04 | |
All of | ||
ubuntu/libeditorconfig0 | <0.12.0-2ubuntu0.1~esm2 | 0.12.0-2ubuntu0.1~esm2 |
Ubuntu Ubuntu | =16.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.