GHSA-377p-g8gr-5wpg

Suggest an improvement
Source
https://github.com/advisories/GHSA-377p-g8gr-5wpg
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/05/GHSA-377p-g8gr-5wpg/GHSA-377p-g8gr-5wpg.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-377p-g8gr-5wpg
Aliases
Published
2024-05-03T18:30:37Z
Modified
2024-11-22T20:57:29.210800Z
Severity
  • 3.9 (Low) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N CVSS Calculator
Summary
LIEF obtain sensitive information via the name parameter
Details

An issue in LIEF v.0.14.1 allows a local attacker to obtain sensitive information via the name parameter of the machd_reader.c component.

Database specific
{
    "nvd_published_at": "2024-05-03T17:15:07Z",
    "cwe_ids": [
        "CWE-457"
    ],
    "severity": "LOW",
    "github_reviewed": true,
    "github_reviewed_at": "2024-11-22T20:26:56Z"
}
References

Affected packages

PyPI / lief

Package

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.15.0

Affected versions

0.*

0.8.0
0.8.1
0.8.2
0.8.3
0.9.0
0.10.0
0.10.1
0.11.0
0.11.1
0.11.2
0.11.3
0.11.4
0.11.5
0.12.0
0.12.1
0.12.2
0.12.3
0.13.0
0.13.1
0.13.2
0.14.0
0.14.1