CVE-2013-0223

NameCVE-2013-0223
DescriptionThe SUSE coreutils-i18n.patch for GNU coreutils allows context-dependent attackers to cause a denial of service (segmentation fault and crash) via a long string to the join command, when using the -i switch, which triggers a stack-based buffer overflow in the alloca function.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
coreutils (PTS)bullseye8.32-4fixed
bookworm9.1-1fixed
sid, trixie9.5-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
coreutilssource(unstable)(not affected)

Notes

- coreutils <not-affected> (Affected patch not added to Debian package)
https://www.openwall.com/lists/oss-security/2013/01/21/14

Search for package or bug name: Reporting problems