DEBIAN-CVE-2023-24056

Source
https://security-tracker.debian.org/tracker/CVE-2023-24056
Import Source
https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2023-24056.json
JSON Data
https://api.osv.dev/v1/vulns/DEBIAN-CVE-2023-24056
Upstream
Published
2023-01-22T04:15:11.617Z
Modified
2025-11-20T10:16:32.138761Z
Severity
  • 5.5 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H CVSS Calculator
Summary
[none]
Details

In pkgconf through 1.9.3, variable duplication can cause unbounded string expansion due to incorrect checks in libpkgconf/tuple.c:pkgconftupleparse. For example, a .pc file containing a few hundred bytes can expand to one billion bytes.

References

Affected packages

Debian:11 / pkgconf

Package

Name
pkgconf
Purl
pkg:deb/debian/pkgconf?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*

1.7.4~git20210206+dcf529b-3
1.8.0-1
1.8.0-2
1.8.0-3
1.8.0-4
1.8.0-5
1.8.0-6
1.8.0-8
1.8.0-9
1.8.0-10
1.8.0-11
1.8.0-12
1.8.1-1
1.8.1-1+loong64
1.8.1-2
1.8.1-3
1.8.1-4

2.*

2.5.1-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:12 / pkgconf

Package

Name
pkgconf
Purl
pkg:deb/debian/pkgconf?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.8.1-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:13 / pkgconf

Package

Name
pkgconf
Purl
pkg:deb/debian/pkgconf?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.8.1-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:14 / pkgconf

Package

Name
pkgconf
Purl
pkg:deb/debian/pkgconf?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.8.1-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}