CVE-2024-0684

A flaw was found in the GNU coreutils "split" program. A heap overflow with user-controlled data of multiple hundred bytes in length could occur in the line_bytes_split() function, potentially leading to an application crash and denial of service.

  • logo

    System detected CVE-2024-0684 with a risk of 1.75

  • logo

    System created a ticket for CVE-2024-0684

    Everything after this entry will be synced with the external system. The ticket can be found at https://github.com/l3montree-dev/devguard-action/issues/101

  • logo

    System detected CVE-2024-0684 on another ref: main

  • logo

    System created a ticket for CVE-2024-0684

    Everything after this entry will be synced with the external system. The ticket can be found at undefined

  • logo

    System detected CVE-2024-0684 with scanner: container-scanning:test

  • S

    Sebastian Kawelke updated the risk assessment from 1.75 to 3.35

    Confidentiality Requirement updated: high -> low, Availability Requirement updated: low -> high

  • logo

    System updated the risk assessment from 3.35 to 3.45

    System recalculated raw risk assessment

  • logo

    System removed scanner: container-scanning

  • logo

    System fixed CVE-2024-0684

Reopen this vulnerability

You can reopen this vuln, if you plan to mitigate the risk now, or accepted this vuln by accident.

Comment will be synced with https://github.com/l3montree-dev/devguard-action/issues/153
Last calculated at:

Affected component

Logo von deb debian/coreutils

Installed version:
9.1-1
Fixed in:
no patch available

Management decisions across the organization

Copyright © 2025 L3montree GmbH and the DevGuard Contributors. All rights reserved. Version 71cda54d19c6900d5d185b8bc7c11608a8a65bac