CVE-2013-0223

Publication date 23 November 2013

Last updated 24 July 2024


Ubuntu priority

The SUSE coreutils-i18n.patch for GNU coreutils allows context-dependent attackers to cause a denial of service (segmentation fault and crash) via a long string to the join command, when using the -i switch, which triggers a stack-based buffer overflow in the alloca function.

Read the notes from the security team

Status

Package Ubuntu Release Status
coreutils 12.10 quantal
Not affected
12.04 LTS precise
Not affected
11.10 oneiric
Not affected
10.04 LTS lucid
Not affected
8.04 LTS hardy
Not affected

Notes


mdeslaur

Debian/Ubuntu don't use the vulnerable patch