First published: Wed Sep 20 2023(Updated: )
It was discovered that Indent incorrectly handled parsing certain source files. If a user or automated system were tricked into processing a specially crafted source file, a remote attacker could use this issue to cause Indent to crash, resulting in a denial of service, or possibly execute arbitrary code.
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/indent | <2.2.12-4ubuntu0.1 | 2.2.12-4ubuntu0.1 |
=23.04 | ||
All of | ||
ubuntu/indent | <2.2.12-1ubuntu0.22.04.1 | 2.2.12-1ubuntu0.22.04.1 |
=22.04 | ||
All of | ||
ubuntu/indent | <2.2.12-1ubuntu0.20.04.1 | 2.2.12-1ubuntu0.20.04.1 |
=20.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is USN-6389-1.
The title of the vulnerability is Indent vulnerability.
This vulnerability can be exploited by tricking a user or automated system into processing a specially crafted source file.
The impact of this vulnerability is a denial of service or potentially the execution of arbitrary code.
To fix this vulnerability, update the indent package to the specified version for your Ubuntu release.