发布于3月6日3月6日 Members Amazon Linux 2023: CVE-2023-32181: Important priority package update for libeconf Severity 8 CVSS (AV:N/AC:L/Au:N/C:N/I:N/A:C) Published 03/16/2023 Created 02/14/2025 Added 02/14/2025 Modified 02/14/2025 Description A Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') vulnerability in openSUSE libeconf allows for DoS via malformed configuration files This issue affects libeconf: before 0.5.2. A flaw was found in the libeconf library. This issue occurs when parsing a specially crafted configuration file, causing a stack-based buffer overflow, resulting in a denial of service. Solution(s) amazon-linux-2023-upgrade-libeconf amazon-linux-2023-upgrade-libeconf-debuginfo amazon-linux-2023-upgrade-libeconf-debugsource amazon-linux-2023-upgrade-libeconf-devel amazon-linux-2023-upgrade-libeconf-utils amazon-linux-2023-upgrade-libeconf-utils-debuginfo References https://attackerkb.com/topics/cve-2023-32181 CVE - 2023-32181 https://alas.aws.amazon.com/AL2023/ALAS-2023-227.html