14 lines
1.3 KiB
JSON
14 lines
1.3 KiB
JSON
{
|
|
"id": "openEuler-SA-2023-1575",
|
|
"url": "https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2023-1575",
|
|
"title": "An update for gawk is now available for openEuler-20.03-LTS-SP1,openEuler-20.03-LTS-SP3,openEuler-22.03-LTS,openEuler-22.03-LTS-SP1 and openEuler-22.03-LTS-SP2",
|
|
"severity": "Low",
|
|
"description": "The gawk package is the GNU implementation of awk. The awk utility interprets a special-purpose programming language that makes it possible to handle simple data-reformatting jobs with just a few lines of code.\r\n\r\nSecurity Fix(es):\r\n\r\nA heap out of bound read issue exists in builtin.c of gawk prior to version 5.1.1. The array \"the_args\" takes an unsafe index \"val\", while it does not validate the index to ensure the index refers to a valid position in the array (e.g., exceedingly large or negative). The vulnerability can cause crash of the software and might be used by attackers to read sensitive information.\r\n\r\nhttps://mail.gnu.org/archive/html/bug-gawk/2022-08/msg00000.html\nhttps://mail.gnu.org/archive/html/bug-gawk/2022-08/msg00023.html\nhttps://fossies.org/linux/gawk/ChangeLog#470 (Line: 470-475)(CVE-2023-4156)",
|
|
"cves": [
|
|
{
|
|
"id": "CVE-2023-4156",
|
|
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-4156",
|
|
"severity": "Low"
|
|
}
|
|
]
|
|
} |