CVE-2024-0684
A flaw was found in the GNU coreutils "split" program. A heap overflow with user-controlled data of multiple hundred bytes in length could occur in the line_bytes_split() function, potentially leading to an application crash and denial of service.
- T
Tim Bastin detected CVE-2024-0684 with a risk of 2.6
- T
Tim Bastin fixed CVE-2024-0684
- T
Tim Bastin detected CVE-2024-0684 with a risk of 2.6
System updated the risk assessment to 1.3
System recalculated raw risk assessment
System updated the risk assessment to 2.6
System recalculated raw risk assessment
System updated the risk assessment to 1.3
System recalculated raw risk assessment
System updated the risk assessment from 1.3 to 2.6
System recalculated raw risk assessment
System detected CVE-2024-0684 with scanner: container-scanning github.com/l3montree-dev/devguard/cmd/devguard-scanner/container-scanning github.com/l3montree-dev/devguard/cmd/devguard-scanner/container-scanning
System fixed CVE-2024-0684
System detected CVE-2024-0684 with a risk of 2.6
System fixed CVE-2024-0684
System detected CVE-2024-0684 with a risk of 2.6
System detected CVE-2024-0684 with scanner: container-scanning
- T
Tim Bastin fixed CVE-2024-0684
- S
Sebastian Kawelke updated the risk assessment from 2.6 to 3.35
Confidentiality Requirement updated: medium -> low, Integrity Requirement updated: medium -> high, Availability Requirement updated: medium -> high
System updated the risk assessment from 3.35 to 3.45
System recalculated raw risk assessment
Reopen this vulnerability
Affected component
debian/coreutils