CVE-2013-0223

NameCVE-2013-0223
DescriptionThe SUSE coreutils-i18n.patch for GNU coreutils allows context-dependent attackers to cause a denial of service (segmentation fault and crash) via a long string to the join command, when using the -i switch, which triggers a stack-based buffer overflow in the alloca function.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)
NVD severitylow

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
coreutils (PTS)stretch8.26-3fixed
buster8.30-3fixed
bookworm, sid, bullseye8.32-4fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
coreutilssource(unstable)(not affected)

Notes

- coreutils <not-affected> (Affected patch not added to Debian package)
https://www.openwall.com/lists/oss-security/2013/01/21/14

Search for package or bug name: Reporting problems