Bug 2260399 (CVE-2024-0911)

Summary: CVE-2024-0911 indent: heap-based buffer overflow in set_buf_break()
Product: [Other] Security Response Reporter: Robb Gatica <rgatica>
Component: vulnerabilityAssignee: Product Security <prodsec-ir-bot>
Status: NEW --- QA Contact:
Severity: low Docs Contact:
Priority: low    
Version: unspecifiedCC: ppisar
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Fixed In Version: Doc Type: If docs needed, set a value
Doc Text:
A flaw was found in indent, a program for formatting C code. This issue may allow an attacker to trick a user into processing a specially crafted file to trigger a heap-based buffer overflow, causing the application to crash.
Story Points: ---
Clone Of: Environment:
Last Closed: Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Bug Depends On: 2259883, 2260400, 2260401    
Bug Blocks: 2260397    

Description Robb Gatica 2024-01-25 21:41:53 UTC
GNU Indent 2.2.13 has a heap-based buffer overflow in set_buf_break via a crafted file. 

Originally reported at: https://bugzilla.redhat.com/show_bug.cgi?id=2259883

Comment 1 Robb Gatica 2024-01-25 21:45:16 UTC
Created indent tracking bugs for this issue:

Affects: epel-all [bug 2260400]
Affects: fedora-all [bug 2260401]

Comment 2 Petr Pisar 2024-01-26 08:50:46 UTC
An upstream bug report <https://lists.gnu.org/archive/html/bug-indent/2024-01/msg00000.html>.