First published: Thu Jan 24 2013(Updated: )
It was reported [1] that the uniq command suffered from a segfault when processing input streams that contained extremely long strings. This flaw is due to the inclusion of the coreutils-i18n.patch. SUSE has fixed this by fixing the patch. The changes can be seen here [2]. (There is probably e better place to get the patch, but I don't know where). [1] <a href="https://bugzilla.novell.com/show_bug.cgi?id=796243">https://bugzilla.novell.com/show_bug.cgi?id=796243</a> [2] <a href="https://build.opensuse.org/request/show/149348#diff_headline_coreutils-i18n-patch_diff_action_0_submit_0_19">https://build.opensuse.org/request/show/149348#diff_headline_coreutils-i18n-patch_diff_action_0_submit_0_19</a> Statement: (none)
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
SUSE Linux | =11.4 | |
SUSE Linux | =12.1 | |
SUSE Linux | =12.2 | |
Red Hat Enterprise Linux | =6.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-0222 is classified as a high severity vulnerability due to its potential to cause a segmentation fault.
To fix CVE-2013-0222, update your system to the latest version of coreutils that contains the patched uniq command.
CVE-2013-0222 affects openSUSE versions 11.4, 12.1, 12.2 and Red Hat Enterprise Linux version 6.0.
Not patching CVE-2013-0222 may lead to crashes or unexpected behavior when processing long input streams with the uniq command.
The primary symptom of CVE-2013-0222 is a segmentation fault occurring while using the uniq command with extremely long strings.