First published: Mon Aug 14 2023(Updated: )
GNU indent 2.2.13 has a heap-based buffer overflow in search_brace in indent.c via a crafted file.
Credit: cve@mitre.org cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
GNU indent | =2.2.13 | |
ubuntu/indent | <2.2.12-1ubuntu0.20.04.1 | 2.2.12-1ubuntu0.20.04.1 |
ubuntu/indent | <2.2.13-3 | 2.2.13-3 |
ubuntu/indent | <2.2.12-1ubuntu0.22.04.1 | 2.2.12-1ubuntu0.22.04.1 |
ubuntu/indent | <2.2.12-4ubuntu0.1 | 2.2.12-4ubuntu0.1 |
debian/indent | <=2.2.12-1 | 2.2.12-4+deb12u2 2.2.13-4 |
https://git.savannah.gnu.org/cgit/indent.git/commit/?id=2685cc0bef0200733b634932ea7399b6cf91b6d7
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2023-40305.
The severity of CVE-2023-40305 is medium with a CVSS score of 5.5.
CVE-2023-40305 allows remote attackers to execute arbitrary code or cause a denial of service via a crafted file, resulting in a heap-based buffer overflow in the search_brace function in indent.c.
To fix the vulnerability, you should update GNU indent to version 2.2.13-3 or later.
You can find more information about CVE-2023-40305 at the following references: [Reference 1](https://ftp.gnu.org/gnu/indent/), [Reference 2](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3W6SL3NKMH5R4S5PD2O3MTC2UR4SBVHK/), [Reference 3](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4MIUH3F63KQJWYR3FLKRZUYYRJOY6FYX/).