Description
Buffer overflow vulnerability in libsolv 2020-12-13 via the Solver * testcase_read(Pool *pool, FILE *fp, const char *testcase, Queue *job, char **resultp, int *resultflagsp function at src/testcase.c: line 2334, which could cause a denial of service
References (3)
Core 3
Core References
Exploit, Issue Tracking, Third Party Advisory x_refsource_misc
https://github.com/openSUSE/libsolv/issues/416
Exploit, Third Party Advisory x_refsource_misc
https://github.com/yangjiageng/PoC/blob/master/libsolv-PoCs/PoC-testcase_read-2334
Patch, Third Party Advisory x_refsource_misc
https://www.oracle.com/security-alerts/cpuapr2022.html
Scores
CVSS v3
3.3
EPSS
0.0003
EPSS Percentile
9.4%
Attack Vector
LOCAL
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
Details
CWE
CWE-120
Status
published
Products (2)
opensuse/libsolv
< 0.7.17
oracle/communications_cloud_native_core_policy
1.15.0
Published
May 18, 2021
Tracked Since
Feb 18, 2026