First published: Thu Sep 14 2023(Updated: )
It was discovered that gawk could be made to read out of bounds when processing certain inputs. If a user or an automated system were tricked into opening a specially crafted input, an attacker could possibly use this issue to cause a denial of service.
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/gawk | <1:5.1.0-1ubuntu0.1 | 1:5.1.0-1ubuntu0.1 |
Ubuntu | =22.04 | |
All of | ||
ubuntu/gawk | <1:5.0.1+dfsg-1ubuntu0.1 | 1:5.0.1+dfsg-1ubuntu0.1 |
Ubuntu | =20.04 | |
All of | ||
ubuntu/gawk | <1:4.1.4+dfsg-1ubuntu0.1~esm1 | 1:4.1.4+dfsg-1ubuntu0.1~esm1 |
Ubuntu | =18.04 | |
All of | ||
ubuntu/gawk | <1:4.1.3+dfsg-0.1ubuntu0.1~esm1 | 1:4.1.3+dfsg-0.1ubuntu0.1~esm1 |
Ubuntu | =16.04 | |
All of | ||
ubuntu/gawk | <1:4.0.1+dfsg-2.1ubuntu2+esm1 | 1:4.0.1+dfsg-2.1ubuntu2+esm1 |
Ubuntu | =14.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of this gawk vulnerability is CVE-2023-4156.
The severity of CVE-2023-4156 is not mentioned in the provided information. Please refer to the official references for more details.
The gawk vulnerability affects Ubuntu Ubuntu 22.04 with gawk package version up to exclusive 1:5.1.0-1ubuntu0.1. Please update the package to version 1:5.1.0-1ubuntu0.1 or higher to mitigate the vulnerability.
To fix the gawk vulnerability in Ubuntu Ubuntu 20.04, update the gawk package to version 1:5.0.1+dfsg-1ubuntu0.1 or higher.
More information about the gawk vulnerability can be found at the following references: [1] [2]