First published: Thu Jan 18 2024(Updated: )
A flaw was found in the GNU coreutils "split" program. A heap overflow with user-controlled data of multiple hundred bytes in length could occur in the line_bytes_split() function, potentially leading to an application crash and denial of service.
Credit: patrick@puiterwijk.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/coreutils | <9.2 | 9.2 |
CentOS coreutils-common | =9.2 | |
CentOS coreutils-common | =9.3 | |
CentOS coreutils-common | =9.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-0684 has a severity rating of medium due to its potential to cause application crashes and denial of service.
To mitigate CVE-2024-0684, update your GNU coreutils package to version 9.3 or later.
CVE-2024-0684 is caused by a heap overflow vulnerability in the GNU coreutils 'split' program due to user-controlled data processing.
Versions of coreutils prior to 9.3, starting from 9.2, are affected by CVE-2024-0684.
CVE-2024-0684 may allow for exploitation that could lead to denial of service, depending on how the 'split' program is used in a given environment.