Headline
Ubuntu Security Notice USN-5842-1
Ubuntu Security Notice 5842-1 - Mark Esler and David Fernandez Gonzalez discovered that EditorConfig Core C incorrectly handled memory when handling certain inputs. An attacker could possibly use this issue to cause applications using EditorConfig Core C to crash, resulting in a denial of service, or possibly execute arbitrary code.
==========================================================================
Ubuntu Security Notice USN-5842-1
February 06, 2023
editorconfig-core vulnerability
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 22.10
- Ubuntu 22.04 LTS
- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS
- Ubuntu 16.04 ESM
Summary:
EditorConfig Core C could be made to crash or run programs if it received
specially crafted input.
Software Description:
- editorconfig-core: coding style indenter for all editors
Details:
Mark Esler and David Fernandez Gonzalez discovered that EditorConfig Core C
incorrectly handled memory when handling certain inputs. An attacker could
possibly use this issue to cause applications using EditorConfig Core C
to crash, resulting in a denial of service, or possibly execute
arbitrary code.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 22.10:
editorconfig 0.12.5-2.1ubuntu0.1
libeditorconfig0 0.12.5-2.1ubuntu0.1
Ubuntu 22.04 LTS:
editorconfig 0.12.5-2ubuntu0.1~esm1
libeditorconfig0 0.12.5-2ubuntu0.1~esm1
Ubuntu 20.04 LTS:
editorconfig 0.12.1-1.1ubuntu0.20.04.1~esm1
libeditorconfig0 0.12.1-1.1ubuntu0.20.04.1~esm1
Ubuntu 18.04 LTS:
editorconfig 0.12.1-1.1ubuntu0.18.04.1~esm1
libeditorconfig-dev 0.12.1-1.1ubuntu0.18.04.1~esm1
libeditorconfig0 0.12.1-1.1ubuntu0.18.04.1~esm1
Ubuntu 16.04 ESM:
editorconfig 0.12.0-2ubuntu0.1~esm1
libeditorconfig0 0.12.0-2ubuntu0.1~esm1
In general, a standard system update will make all the necessary changes.
References:
https://ubuntu.com/security/notices/USN-5842-1
CVE-2023-0341
Package Information:
https://launchpad.net/ubuntu/+source/editorconfig-core/0.12.5-2.1ubuntu0.1
https://launchpad.net/ubuntu/+source/editorconfig-core/0.12.5-2ubuntu0.1~esm1
https://launchpad.net/ubuntu/+source/editorconfig-core/0.12.1-1.1ubuntu0.20.04.1~esm1
https://launchpad.net/ubuntu/+source/editorconfig-core/0.12.1-1.1ubuntu0.18.04.1~esm1
Related news
Gentoo Linux Security Advisory 202411-4 - A vulnerability has been discovered in EditorConfig Core C library, which may lead to arbitrary code execution. Versions greater than or equal to 0.12.6 are affected.
A stack buffer overflow exists in the ec_glob function of editorconfig-core-c before v0.12.6 which allowed an attacker to arbitrarily write to the stack and possibly allows remote code execution. editorconfig-core-c v0.12.6 resolved this vulnerability by bound checking all write operations over the p_pcre buffer.