
Cloud Vulnerability DB
A community-led vulnerabilities database
A heap-based buffer overflow vulnerability (CVE-2024-0911) was discovered in GNU Indent version 2.2.13, a program used for formatting C code. The vulnerability was reported on January 20, 2024, and allows an attacker to trigger a heap-based buffer overflow by tricking a user into processing a specially crafted file (GNU Indent Bug, NVD).
The vulnerability exists in the set_buf_break function located in indent/src/output.c line 319, where a heap-based buffer overflow occurs during a read operation of size 2. The issue is triggered when processing specially crafted input files. The vulnerability has been assigned a CVSS v3.1 base score of 5.5 (Medium) with the vector string CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H (NVD).
When exploited, this vulnerability can cause the application to crash through a heap-based buffer overflow. The impact is primarily limited to availability, with no direct impact on confidentiality or integrity of the system (Red Hat CVE).
The vulnerability has been fixed in subsequent releases of GNU Indent. Various Linux distributions have released security patches to address this vulnerability. Users are advised to update to the latest version of the software through their respective package managers (Debian Tracker).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."