The SUSE coreutils-i18n.patch for GNU coreutils allows...
Low severity
Unreviewed
Published
May 5, 2022
to the GitHub Advisory Database
•
Updated Feb 10, 2023
Description
Published by the National Vulnerability Database
Nov 23, 2013
Published to the GitHub Advisory Database
May 5, 2022
Last updated
Feb 10, 2023
The SUSE coreutils-i18n.patch for GNU coreutils allows context-dependent attackers to cause a denial of service (segmentation fault and crash) via a long string to the join command, when using the -i switch, which triggers a stack-based buffer overflow in the alloca function.
References