<!--X-Body-Begin-->
<!--X-User-Header-->
oss-sec
mailing list archives
<!--X-User-Header-End-->
<!--X-TopPNI-->
By Date
By Thread
</form>
<!--X-TopPNI-End-->
<!--X-MsgBody-->
<!--X-Subject-Header-Begin-->
Re: GNU coreutils v9.4; v9.3; v9.2 split heap buffer overflow vulnerability
<!--X-Subject-Header-End-->
<!--X-Head-of-Message-->
From: Valentin Metz <valentin.metz () tum de>
Date: Fri, 19 Jan 2024 09:43:49 +0100
<!--X-Head-of-Message-End-->
<!--X-Head-Body-Sep-Begin-->
<!--X-Head-Body-Sep-End-->
<!--X-Body-of-Message-->
CVE-2024-0684 has been assigned for tracking.
https://access.redhat.com/security/cve/cve-2024-0684
Attachment:
OpenPGP_0x1E1CC59A3E0AC2FF.asc
Description: OpenPGP public key
Attachment:
OpenPGP_signature.asc
Description: OpenPGP digital signature
<!--X-Body-of-Message-End-->
<!--X-MsgBody-End-->
<!--X-Follow-Ups-->
<!--X-Follow-Ups-End-->
<!--X-References-->
<!--X-References-End-->
<!--X-BotPNI-->
By Date
By Thread
Current thread:
GNU coreutils v9.4; v9.3; v9.2 split heap buffer overflow vulnerability Valentin Metz (Jan 18)
Re: GNU coreutils v9.4; v9.3; v9.2 split heap buffer overflow vulnerability Valentin Metz (Jan 19)
<!--X-BotPNI-End-->
<!--X-User-Footer-->
<!--X-User-Footer-End-->