First published: Thu Jan 24 2013(Updated: )
It was reported [1] that the join command suffered from a segfault when processing input streams that contained extremely long strings when used with the -i switch. This flaw is due to the inclusion of the coreutils-i18n.patch. SUSE has fixed this by fixing the patch. The changes can be seen here [2]. (There is probably e better place to get the patch, but I don't know where). [1] <a href="https://bugzilla.novell.com/show_bug.cgi?id=798541">https://bugzilla.novell.com/show_bug.cgi?id=798541</a> [2] <a href="https://build.opensuse.org/request/show/149348#diff_headline_coreutils-i18n-patch_diff_action_0_submit_0_19">https://build.opensuse.org/request/show/149348#diff_headline_coreutils-i18n-patch_diff_action_0_submit_0_19</a> Statement: (none)
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
SUSE Linux | =11.4 | |
SUSE Linux | =12.1 | |
SUSE Linux | =12.2 | |
Red Hat Enterprise Linux | =6.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-0223 is classified as a moderate severity vulnerability.
To fix CVE-2013-0223, update the coreutils package to the latest version provided by your Linux distribution.
CVE-2013-0223 affects openSUSE versions 11.4, 12.1, and 12.2, as well as Red Hat Enterprise Linux 6.0.
CVE-2013-0223 causes the join command to experience a segmentation fault with extremely long strings when using the -i switch.
As of the latest information, there are no known active exploits for CVE-2013-0223.