CVE-2024-0684
A flaw was found in the GNU coreutils "split" program. A heap overflow with user-controlled data of multiple hundred bytes in length could occur in the line_bytes_split() function, potentially leading to an application crash and denial of service.
- T
Tim Bastin detected CVE-2024-0684 with a risk of 2.6
- T
Tim Bastin fixed CVE-2024-0684
- T
Tim Bastin detected CVE-2024-0684 with a risk of 2.6
System fixed CVE-2024-0684
System detected CVE-2024-0684 with a risk of 2.6
System fixed CVE-2024-0684
System detected CVE-2024-0684 with a risk of 2.6
System detected CVE-2024-0684 on another ref: main
- T
Tim Bastin fixed CVE-2024-0684
- S
Sebastian Kawelke updated the risk assessment from 2.6 to 3.35
Confidentiality Requirement updated: medium -> low, Integrity Requirement updated: medium -> high, Availability Requirement updated: medium -> high
System updated the risk assessment from 3.35 to 3.45
System recalculated raw risk assessment
Reopen this vulnerability
Affected component
debian/coreutils