Your submission was sent successfully! Close

You have successfully unsubscribed! Close

Thank you for signing up for our newsletter!
In these regular emails you will find the latest updates about Ubuntu and upcoming events where you can meet our team.Close

CVE-2023-26112

Published: 3 April 2023

All versions of the package configobj are vulnerable to Regular Expression Denial of Service (ReDoS) via the validate function, using (.+?)\((.*)\). **Note:** This is only exploitable in the case of a developer, putting the offending value in a server side configuration file.

Notes

AuthorNote
mdeslaur
per advisory: "This is only exploitable in the case of a
developer, putting the offending value in a server side
configuration file"
iconstantin
as of 2024-01-08, the proposed fix has not yet been committed

Priority

Low

Cvss 3 Severity Score

5.9

Score breakdown

Status

Package Release Status
configobj
Launchpad, Ubuntu, Debian
bionic Deferred

focal Deferred

jammy Deferred

kinetic Ignored
(end of life, was needs-triage)
lunar Ignored
(end of life, was deferred)
mantic Deferred

trusty Deferred

upstream Needs triage

xenial Deferred

Severity score breakdown

Parameter Value
Base score 5.9
Attack vector Network
Attack complexity High
Privileges required None
User interaction None
Scope Unchanged
Confidentiality None
Integrity impact None
Availability impact High
Vector CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H