CVE-2013-0221

NameCVE-2013-0221
DescriptionThe SUSE coreutils-i18n.patch for GNU coreutils allows context-dependent attackers to cause a denial of service (segmentation fault and crash) via a long string to the sort command, when using the (1) -d or (2) -M switch, which triggers a stack-based buffer overflow in the alloca function.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
coreutils (PTS)buster8.30-3fixed
bullseye8.32-4fixed
bookworm9.1-1fixed
trixie9.4-3fixed
sid9.4-3.1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
coreutilssource(unstable)(not affected)

Notes

- coreutils <not-affected> (Affected patch not added to Debian package)
https://www.openwall.com/lists/oss-security/2013/01/21/14

Search for package or bug name: Reporting problems