Security
Headlines
HeadlinesLatestCVEs

Headline

Ubuntu Security Notice USN-5842-1

Ubuntu Security Notice 5842-1 - Mark Esler and David Fernandez Gonzalez discovered that EditorConfig Core C incorrectly handled memory when handling certain inputs. An attacker could possibly use this issue to cause applications using EditorConfig Core C to crash, resulting in a denial of service, or possibly execute arbitrary code.

Packet Storm
#vulnerability#ubuntu#dos

==========================================================================
Ubuntu Security Notice USN-5842-1
February 06, 2023

editorconfig-core vulnerability

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 22.10
  • Ubuntu 22.04 LTS
  • Ubuntu 20.04 LTS
  • Ubuntu 18.04 LTS
  • Ubuntu 16.04 ESM

Summary:

EditorConfig Core C could be made to crash or run programs if it received
specially crafted input.

Software Description:

  • editorconfig-core: coding style indenter for all editors

Details:

Mark Esler and David Fernandez Gonzalez discovered that EditorConfig Core C
incorrectly handled memory when handling certain inputs. An attacker could
possibly use this issue to cause applications using EditorConfig Core C
to crash, resulting in a denial of service, or possibly execute
arbitrary code.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 22.10:
editorconfig 0.12.5-2.1ubuntu0.1
libeditorconfig0 0.12.5-2.1ubuntu0.1

Ubuntu 22.04 LTS:
editorconfig 0.12.5-2ubuntu0.1~esm1
libeditorconfig0 0.12.5-2ubuntu0.1~esm1

Ubuntu 20.04 LTS:
editorconfig 0.12.1-1.1ubuntu0.20.04.1~esm1
libeditorconfig0 0.12.1-1.1ubuntu0.20.04.1~esm1

Ubuntu 18.04 LTS:
editorconfig 0.12.1-1.1ubuntu0.18.04.1~esm1
libeditorconfig-dev 0.12.1-1.1ubuntu0.18.04.1~esm1
libeditorconfig0 0.12.1-1.1ubuntu0.18.04.1~esm1

Ubuntu 16.04 ESM:
editorconfig 0.12.0-2ubuntu0.1~esm1
libeditorconfig0 0.12.0-2ubuntu0.1~esm1

In general, a standard system update will make all the necessary changes.

References:
https://ubuntu.com/security/notices/USN-5842-1
CVE-2023-0341

Package Information:
https://launchpad.net/ubuntu/+source/editorconfig-core/0.12.5-2.1ubuntu0.1
https://launchpad.net/ubuntu/+source/editorconfig-core/0.12.5-2ubuntu0.1~esm1
https://launchpad.net/ubuntu/+source/editorconfig-core/0.12.1-1.1ubuntu0.20.04.1~esm1
https://launchpad.net/ubuntu/+source/editorconfig-core/0.12.1-1.1ubuntu0.18.04.1~esm1

Related news

Gentoo Linux Security Advisory 202411-04

Gentoo Linux Security Advisory 202411-4 - A vulnerability has been discovered in EditorConfig Core C library, which may lead to arbitrary code execution. Versions greater than or equal to 0.12.6 are affected.

CVE-2023-0341: Fix potential buffer overflow in ec_glob (#87) · editorconfig/editorconfig-core-c@41281ea

A stack buffer overflow exists in the ec_glob function of editorconfig-core-c before v0.12.6 which allowed an attacker to arbitrarily write to the stack and possibly allows remote code execution. editorconfig-core-c v0.12.6 resolved this vulnerability by bound checking all write operations over the p_pcre buffer.

Packet Storm: Latest News

CUPS IPP Attributes LAN Remote Code Execution