Количество 21
Количество 21
ELSA-2013-1652
ELSA-2013-1652: coreutils security, bug fix, and enhancement update (LOW)

SUSE-SU-2015:0792-1
Recommended update for coreutils

CVE-2013-0221
The SUSE coreutils-i18n.patch for GNU coreutils allows context-dependent attackers to cause a denial of service (segmentation fault and crash) via a long string to the sort command, when using the (1) -d or (2) -M switch, which triggers a stack-based buffer overflow in the alloca function.

CVE-2013-0221
The SUSE coreutils-i18n.patch for GNU coreutils allows context-dependent attackers to cause a denial of service (segmentation fault and crash) via a long string to the sort command, when using the (1) -d or (2) -M switch, which triggers a stack-based buffer overflow in the alloca function.

CVE-2013-0221
The SUSE coreutils-i18n.patch for GNU coreutils allows context-dependent attackers to cause a denial of service (segmentation fault and crash) via a long string to the sort command, when using the (1) -d or (2) -M switch, which triggers a stack-based buffer overflow in the alloca function.

CVE-2013-0221
CVE-2013-0221
The SUSE coreutils-i18n.patch for GNU coreutils allows context-depende ...
GHSA-x3x5-p66w-97q3
The SUSE coreutils-i18n.patch for GNU coreutils allows context-dependent attackers to cause a denial of service (segmentation fault and crash) via a long string to the sort command, when using the (1) -d or (2) -M switch, which triggers a stack-based buffer overflow in the alloca function.

BDU:2016-01584
Уязвимость набора системных утилит GNU Core Utilities, позволяющая нарушителю вызвать отказ в обслуживании

CVE-2013-0223
The SUSE coreutils-i18n.patch for GNU coreutils allows context-dependent attackers to cause a denial of service (segmentation fault and crash) via a long string to the join command, when using the -i switch, which triggers a stack-based buffer overflow in the alloca function.

CVE-2013-0223
The SUSE coreutils-i18n.patch for GNU coreutils allows context-dependent attackers to cause a denial of service (segmentation fault and crash) via a long string to the join command, when using the -i switch, which triggers a stack-based buffer overflow in the alloca function.

CVE-2013-0223
The SUSE coreutils-i18n.patch for GNU coreutils allows context-dependent attackers to cause a denial of service (segmentation fault and crash) via a long string to the join command, when using the -i switch, which triggers a stack-based buffer overflow in the alloca function.

CVE-2013-0223
CVE-2013-0223
The SUSE coreutils-i18n.patch for GNU coreutils allows context-depende ...

CVE-2013-0222
The SUSE coreutils-i18n.patch for GNU coreutils allows context-dependent attackers to cause a denial of service (segmentation fault and crash) via a long string to the uniq command, which triggers a stack-based buffer overflow in the alloca function.

CVE-2013-0222
The SUSE coreutils-i18n.patch for GNU coreutils allows context-dependent attackers to cause a denial of service (segmentation fault and crash) via a long string to the uniq command, which triggers a stack-based buffer overflow in the alloca function.

CVE-2013-0222
The SUSE coreutils-i18n.patch for GNU coreutils allows context-dependent attackers to cause a denial of service (segmentation fault and crash) via a long string to the uniq command, which triggers a stack-based buffer overflow in the alloca function.

CVE-2013-0222
CVE-2013-0222
The SUSE coreutils-i18n.patch for GNU coreutils allows context-depende ...
GHSA-gqm8-m83m-qjfv
The SUSE coreutils-i18n.patch for GNU coreutils allows context-dependent attackers to cause a denial of service (segmentation fault and crash) via a long string to the join command, when using the -i switch, which triggers a stack-based buffer overflow in the alloca function.
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
ELSA-2013-1652 ELSA-2013-1652: coreutils security, bug fix, and enhancement update (LOW) | больше 11 лет назад | |||
![]() | SUSE-SU-2015:0792-1 Recommended update for coreutils | почти 11 лет назад | ||
![]() | CVE-2013-0221 The SUSE coreutils-i18n.patch for GNU coreutils allows context-dependent attackers to cause a denial of service (segmentation fault and crash) via a long string to the sort command, when using the (1) -d or (2) -M switch, which triggers a stack-based buffer overflow in the alloca function. | CVSS2: 4.3 | 6% Низкий | больше 11 лет назад |
![]() | CVE-2013-0221 The SUSE coreutils-i18n.patch for GNU coreutils allows context-dependent attackers to cause a denial of service (segmentation fault and crash) via a long string to the sort command, when using the (1) -d or (2) -M switch, which triggers a stack-based buffer overflow in the alloca function. | CVSS2: 2.1 | 6% Низкий | больше 12 лет назад |
![]() | CVE-2013-0221 The SUSE coreutils-i18n.patch for GNU coreutils allows context-dependent attackers to cause a denial of service (segmentation fault and crash) via a long string to the sort command, when using the (1) -d or (2) -M switch, which triggers a stack-based buffer overflow in the alloca function. | CVSS2: 4.3 | 6% Низкий | больше 11 лет назад |
![]() | 6% Низкий | почти 5 лет назад | ||
CVE-2013-0221 The SUSE coreutils-i18n.patch for GNU coreutils allows context-depende ... | CVSS2: 4.3 | 6% Низкий | больше 11 лет назад | |
GHSA-x3x5-p66w-97q3 The SUSE coreutils-i18n.patch for GNU coreutils allows context-dependent attackers to cause a denial of service (segmentation fault and crash) via a long string to the sort command, when using the (1) -d or (2) -M switch, which triggers a stack-based buffer overflow in the alloca function. | 6% Низкий | больше 3 лет назад | ||
![]() | BDU:2016-01584 Уязвимость набора системных утилит GNU Core Utilities, позволяющая нарушителю вызвать отказ в обслуживании | CVSS2: 4.3 | 6% Низкий | больше 11 лет назад |
![]() | CVE-2013-0223 The SUSE coreutils-i18n.patch for GNU coreutils allows context-dependent attackers to cause a denial of service (segmentation fault and crash) via a long string to the join command, when using the -i switch, which triggers a stack-based buffer overflow in the alloca function. | CVSS2: 1.9 | 0% Низкий | больше 11 лет назад |
![]() | CVE-2013-0223 The SUSE coreutils-i18n.patch for GNU coreutils allows context-dependent attackers to cause a denial of service (segmentation fault and crash) via a long string to the join command, when using the -i switch, which triggers a stack-based buffer overflow in the alloca function. | CVSS2: 2.1 | 0% Низкий | больше 12 лет назад |
![]() | CVE-2013-0223 The SUSE coreutils-i18n.patch for GNU coreutils allows context-dependent attackers to cause a denial of service (segmentation fault and crash) via a long string to the join command, when using the -i switch, which triggers a stack-based buffer overflow in the alloca function. | CVSS2: 1.9 | 0% Низкий | больше 11 лет назад |
![]() | 0% Низкий | почти 5 лет назад | ||
CVE-2013-0223 The SUSE coreutils-i18n.patch for GNU coreutils allows context-depende ... | CVSS2: 1.9 | 0% Низкий | больше 11 лет назад | |
![]() | CVE-2013-0222 The SUSE coreutils-i18n.patch for GNU coreutils allows context-dependent attackers to cause a denial of service (segmentation fault and crash) via a long string to the uniq command, which triggers a stack-based buffer overflow in the alloca function. | CVSS2: 2.1 | 0% Низкий | больше 11 лет назад |
![]() | CVE-2013-0222 The SUSE coreutils-i18n.patch for GNU coreutils allows context-dependent attackers to cause a denial of service (segmentation fault and crash) via a long string to the uniq command, which triggers a stack-based buffer overflow in the alloca function. | CVSS2: 2.1 | 0% Низкий | больше 12 лет назад |
![]() | CVE-2013-0222 The SUSE coreutils-i18n.patch for GNU coreutils allows context-dependent attackers to cause a denial of service (segmentation fault and crash) via a long string to the uniq command, which triggers a stack-based buffer overflow in the alloca function. | CVSS2: 2.1 | 0% Низкий | больше 11 лет назад |
![]() | 0% Низкий | почти 5 лет назад | ||
CVE-2013-0222 The SUSE coreutils-i18n.patch for GNU coreutils allows context-depende ... | CVSS2: 2.1 | 0% Низкий | больше 11 лет назад | |
GHSA-gqm8-m83m-qjfv The SUSE coreutils-i18n.patch for GNU coreutils allows context-dependent attackers to cause a denial of service (segmentation fault and crash) via a long string to the join command, when using the -i switch, which triggers a stack-based buffer overflow in the alloca function. | 0% Низкий | больше 3 лет назад |
Уязвимостей на страницу