Количество 9
Количество 9

CVE-2013-0221
The SUSE coreutils-i18n.patch for GNU coreutils allows context-dependent attackers to cause a denial of service (segmentation fault and crash) via a long string to the sort command, when using the (1) -d or (2) -M switch, which triggers a stack-based buffer overflow in the alloca function.

CVE-2013-0221
The SUSE coreutils-i18n.patch for GNU coreutils allows context-dependent attackers to cause a denial of service (segmentation fault and crash) via a long string to the sort command, when using the (1) -d or (2) -M switch, which triggers a stack-based buffer overflow in the alloca function.

CVE-2013-0221
The SUSE coreutils-i18n.patch for GNU coreutils allows context-dependent attackers to cause a denial of service (segmentation fault and crash) via a long string to the sort command, when using the (1) -d or (2) -M switch, which triggers a stack-based buffer overflow in the alloca function.

CVE-2013-0221
CVE-2013-0221
The SUSE coreutils-i18n.patch for GNU coreutils allows context-depende ...
GHSA-x3x5-p66w-97q3
The SUSE coreutils-i18n.patch for GNU coreutils allows context-dependent attackers to cause a denial of service (segmentation fault and crash) via a long string to the sort command, when using the (1) -d or (2) -M switch, which triggers a stack-based buffer overflow in the alloca function.

BDU:2016-01584
Уязвимость набора системных утилит GNU Core Utilities, позволяющая нарушителю вызвать отказ в обслуживании
ELSA-2013-1652
ELSA-2013-1652: coreutils security, bug fix, and enhancement update (LOW)

SUSE-SU-2015:0792-1
Recommended update for coreutils
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | CVE-2013-0221 The SUSE coreutils-i18n.patch for GNU coreutils allows context-dependent attackers to cause a denial of service (segmentation fault and crash) via a long string to the sort command, when using the (1) -d or (2) -M switch, which triggers a stack-based buffer overflow in the alloca function. | CVSS2: 4.3 | 6% Низкий | больше 11 лет назад |
![]() | CVE-2013-0221 The SUSE coreutils-i18n.patch for GNU coreutils allows context-dependent attackers to cause a denial of service (segmentation fault and crash) via a long string to the sort command, when using the (1) -d or (2) -M switch, which triggers a stack-based buffer overflow in the alloca function. | CVSS2: 2.1 | 6% Низкий | больше 12 лет назад |
![]() | CVE-2013-0221 The SUSE coreutils-i18n.patch for GNU coreutils allows context-dependent attackers to cause a denial of service (segmentation fault and crash) via a long string to the sort command, when using the (1) -d or (2) -M switch, which triggers a stack-based buffer overflow in the alloca function. | CVSS2: 4.3 | 6% Низкий | больше 11 лет назад |
![]() | 6% Низкий | почти 5 лет назад | ||
CVE-2013-0221 The SUSE coreutils-i18n.patch for GNU coreutils allows context-depende ... | CVSS2: 4.3 | 6% Низкий | больше 11 лет назад | |
GHSA-x3x5-p66w-97q3 The SUSE coreutils-i18n.patch for GNU coreutils allows context-dependent attackers to cause a denial of service (segmentation fault and crash) via a long string to the sort command, when using the (1) -d or (2) -M switch, which triggers a stack-based buffer overflow in the alloca function. | 6% Низкий | больше 3 лет назад | ||
![]() | BDU:2016-01584 Уязвимость набора системных утилит GNU Core Utilities, позволяющая нарушителю вызвать отказ в обслуживании | CVSS2: 4.3 | 6% Низкий | больше 11 лет назад |
ELSA-2013-1652 ELSA-2013-1652: coreutils security, bug fix, and enhancement update (LOW) | больше 11 лет назад | |||
![]() | SUSE-SU-2015:0792-1 Recommended update for coreutils | почти 11 лет назад |
Уязвимостей на страницу