Show plain JSON{"affected_release": [{"advisory": "RHSA-2023:4347", "cpe": "cpe:/o:redhat:enterprise_linux:9", "package": "libeconf-0:0.4.1-3.el9_2", "product_name": "Red Hat Enterprise Linux 9", "release_date": "2023-08-01T00:00:00Z"}, {"advisory": "RHSA-2023:5458", "cpe": "cpe:/o:redhat:rhel_eus:9.0", "package": "libeconf-0:0.4.1-3.el9_0", "product_name": "Red Hat Enterprise Linux 9.0 Extended Update Support", "release_date": "2023-10-05T00:00:00Z"}], "bugzilla": {"description": "libeconf: Stack overflow in function read_file at libeconf/lib/getfilecontents.c", "id": "2234595", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2234595"}, "csaw": false, "cvss3": {"cvss3_base_score": "8.8", "cvss3_scoring_vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "status": "verified"}, "cwe": "CWE-121", "details": ["A flaw was found in the libeconf library. This issue occurs when parsing a specially crafted configuration file, causing a stack-based buffer overflow that results in a denial of service."], "mitigation": {"lang": "en:us", "value": "Mitigation for this issue is either not available or the currently available options don't meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability."}, "name": "CVE-2023-30079", "public_date": "2023-08-22T00:00:00Z", "references": ["https://www.cve.org/CVERecord?id=CVE-2023-30079\nhttps://nvd.nist.gov/vuln/detail/CVE-2023-30079"], "statement": "This CVE marked as important as it can allow authenticated remote users to execute arbitrary code, or allow remote users to cause a denial of service.", "threat_severity": "Important"}