CVE-2024-0684
A flaw was found in the GNU coreutils "split" program. A heap overflow with user-controlled data of multiple hundred bytes in length could occur in the line_bytes_split() function, potentially leading to an application crash and denial of service.
System detected CVE-2024-0684 with a risk of 1.75
System created a ticket for CVE-2024-0684
Everything after this entry will be synced with the external system. The ticket can be found at https://github.com/l3montree-dev/devguard-action/issues/101
System detected CVE-2024-0684 on another ref: main
System detected CVE-2024-0684 with scanner: container-scanning:test
- S
Sebastian Kawelke updated the risk assessment from 1.75 to 3.35
Confidentiality Requirement updated: high -> low, Availability Requirement updated: low -> high
System updated the risk assessment from 3.35 to 3.45
System recalculated raw risk assessment
System removed scanner: container-scanning
System fixed CVE-2024-0684
Reopen this vulnerability
Affected component
debian/coreutils