editorconfig-core-c is theEditorConfig core library written in C (for use by plugins supporting EditorConfig parsing). In affected versions several overflows may occur in switch case '[' when the input pattern contains many escaped characters. The added backslashes leave too little space in the output pattern when processing nested brackets such that the remaining input length exceeds the output capacity. This issue has been addressed in release version 0.12.7. Users are advised to upgrade. There are no known workarounds for this vulnerability.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-3978-1 | editorconfig-core security update |
EUVD |
EUVD-2024-52173 | editorconfig-core-c is theEditorConfig core library written in C (for use by plugins supporting EditorConfig parsing). In affected versions several overflows may occur in switch case '[' when the input pattern contains many escaped characters. The added backslashes leave too little space in the output pattern when processing nested brackets such that the remaining input length exceeds the output capacity. This issue has been addressed in release version 0.12.7. Users are advised to upgrade. There are no known workarounds for this vulnerability. |
Ubuntu USN |
USN-7168-1 | EditorConfig vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Wed, 27 Nov 2024 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Editorconfig
Editorconfig editorconfig |
|
| CPEs | cpe:2.3:a:editorconfig:editorconfig:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Editorconfig
Editorconfig editorconfig |
|
| Metrics |
ssvc
|
Tue, 26 Nov 2024 23:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | editorconfig-core-c is theEditorConfig core library written in C (for use by plugins supporting EditorConfig parsing). In affected versions several overflows may occur in switch case '[' when the input pattern contains many escaped characters. The added backslashes leave too little space in the output pattern when processing nested brackets such that the remaining input length exceeds the output capacity. This issue has been addressed in release version 0.12.7. Users are advised to upgrade. There are no known workarounds for this vulnerability. | |
| Title | Several stack buffer overflows and pointer overflows in editorconfig-core-c | |
| Weaknesses | CWE-121 | |
| References |
|
|
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2024-11-27T15:35:10.367Z
Reserved: 2024-11-22T17:30:02.140Z
Link: CVE-2024-53849
Updated: 2024-11-27T15:34:11.647Z
Status : Received
Published: 2024-11-27T00:15:18.223
Modified: 2024-11-27T00:15:18.223
Link: CVE-2024-53849
No data.
OpenCVE Enrichment
No data.
Debian DLA
EUVD
Ubuntu USN