{"id":60161,"date":"2024-11-07T00:20:16","date_gmt":"2024-11-06T21:20:16","guid":{"rendered":"https:\/\/packetstormsecurity.com\/files\/182531\/glsa-202411-04.txt"},"modified":"2024-11-07T00:20:16","modified_gmt":"2024-11-06T21:20:16","slug":"gentoo-linux-security-advisory-202411-04","status":"publish","type":"post","link":"https:\/\/afaghhosting.net\/blog\/gentoo-linux-security-advisory-202411-04\/","title":{"rendered":"Gentoo Linux Security Advisory 202411-04"},"content":{"rendered":"<p>&#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211;<br \/>Gentoo Linux Security Advisory GLSA 202411-04<br \/>&#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211;<br \/>https:\/\/security.gentoo.org\/<br \/>&#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211;<\/p>\n<p>Severity: Normal<br \/>Title: EditorConfig core C library: arbitrary stack write<br \/>Date: November 06, 2024<br \/>Bugs: #905308<br \/>ID: 202411-04<\/p>\n<p>&#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211;<\/p>\n<p>Synopsis<br \/>========<\/p>\n<p>A vulnerability has been discovered in EditorConfig Core C library,<br \/>which may lead to arbitrary code execution.<\/p>\n<p>Background<br \/>==========<\/p>\n<p>EditorConfig core library written in C (for use by plugins supporting<br \/>EditorConfig parsing)<\/p>\n<p>Affected packages<br \/>=================<\/p>\n<p>Package Vulnerable Unaffected<br \/>&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;- &#8212;&#8212;&#8212;&#8212; &#8212;&#8212;&#8212;&#8212;<br \/>app-text\/editorconfig-core-c &lt; 0.12.6 &gt;= 0.12.6<\/p>\n<p>Description<br \/>===========<\/p>\n<p>A vulnerability has been discovered in EditorConfig Core C library.<br \/>Please review the CVE identifier referenced below for details.<\/p>\n<p>Impact<br \/>======<\/p>\n<p>Please review the referenced CVE identifier for details.<\/p>\n<p>Workaround<br \/>==========<\/p>\n<p>There is no known workaround at this time.<\/p>\n<p>Resolution<br \/>==========<\/p>\n<p>All EditorConfig core C library users should upgrade to the latest<br \/>version:<\/p>\n<p># emerge &#8211;sync<br \/># emerge &#8211;ask &#8211;oneshot &#8211;verbose &#8220;&gt;=app-text\/editorconfig-core-c-0.12.6&#8221;<\/p>\n<p>References<br \/>==========<\/p>\n<p>[ 1 ] CVE-2023-0341<br \/>https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2023-0341<\/p>\n<p>Availability<br \/>============<\/p>\n<p>This GLSA and any updates to it are available for viewing at<br \/>the Gentoo Security Website:<\/p>\n<p>https:\/\/security.gentoo.org\/glsa\/202411-04<\/p>\n<p>Concerns?<br \/>=========<\/p>\n<p>Security is a primary focus of Gentoo Linux and ensuring the<br \/>confidentiality and security of our users&#8217; machines is of utmost<br \/>importance to us. Any security concerns should be addressed to<br \/>security@gentoo.org or alternatively, you may file a bug at<br \/>https:\/\/bugs.gentoo.org.<\/p>\n<p>License<br \/>=======<\/p>\n<p>Copyright 2024 Gentoo Foundation, Inc; referenced text<br \/>belongs to its owner(s).<\/p>\n<p>The contents of this document are licensed under the<br \/>Creative Commons &#8211; Attribution \/ Share Alike license.<\/p>\n<p>https:\/\/creativecommons.org\/licenses\/by-sa\/2.5<\/p>\n","protected":false},"excerpt":{"rendered":"<p>&#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211;Gentoo Linux Security Advisory GLSA 202411-04&#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &hellip;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[26],"tags":[],"class_list":["post-60161","post","type-post","status-publish","format-standard","hentry","category-vulnerability"],"_links":{"self":[{"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/posts\/60161","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/comments?post=60161"}],"version-history":[{"count":0,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/posts\/60161\/revisions"}],"wp:attachment":[{"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/media?parent=60161"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/categories?post=60161"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/tags?post=60161"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}