DEBIAN-CVE-2023-26112

Source
https://security-tracker.debian.org/tracker/CVE-2023-26112
Import Source
https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2023-26112.json
JSON Data
https://api.osv.dev/v1/vulns/DEBIAN-CVE-2023-26112
Upstream
Published
2023-04-03T05:15:07Z
Modified
2025-09-30T05:17:41.177117Z
Severity
  • 5.9 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
[none]
Details

All versions of the package configobj are vulnerable to Regular Expression Denial of Service (ReDoS) via the validate function, using (.+?)((.*)).

Note: This is only exploitable in the case of a developer, putting the offending value in a server side configuration file.

References

Affected packages

Debian:11 / configobj

Package

Name
configobj
Purl
pkg:deb/debian/configobj?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

5.*

5.0.6-4
5.0.6-5
5.0.6+git20201014.3e2f4cc-1
5.0.8-1
5.0.8-2
5.0.8-3
5.0.9-1

Ecosystem specific

{
    "urgency": "unimportant"
}

Debian:12 / configobj

Package

Name
configobj
Purl
pkg:deb/debian/configobj?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

5.*

5.0.8-1
5.0.8-2
5.0.8-3
5.0.9-1

Ecosystem specific

{
    "urgency": "unimportant"
}

Debian:13 / configobj

Package

Name
configobj
Purl
pkg:deb/debian/configobj?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.0.8-2

Ecosystem specific

{
    "urgency": "unimportant"
}

Debian:14 / configobj

Package

Name
configobj
Purl
pkg:deb/debian/configobj?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.0.8-2

Ecosystem specific

{
    "urgency": "unimportant"
}